Tree automata with one memory set constraints and cryptographic protocols |
| |
Affiliation: | 1. Department of Computer Science, Gates 4B, Stanford University, CA 94305-9045, USA;2. Laboratoire Spécification et Vérification, CNRS and Ecole Normale Supérieure de Cachan, 61 Avenue du Président Wilson, 94235 Cachan cedex, France |
| |
Abstract: | We introduce a class of tree automata that perform tests on a memory that is updated using function symbol application and projection. The language emptiness problem for this class of tree automata is shown to be in DEXPTIME.We also introduce a class of set constraints with equality tests and prove its decidability by completion techniques and a reduction to tree automata with one memory.Finally, we show how to apply these results to cryptographic protocols. We introduce a class of cryptographic protocols and show the decidability of secrecy for an arbitrary number of agents and an arbitrary number of (concurrent or successive) sessions, provided that only a bounded number of new data is generated. The hypothesis on the protocol (a restricted copying ability) is shown to be necessary: without this hypothesis, we prove that secrecy is undecidable, even for protocols without nonces. |
| |
Keywords: | |
本文献已被 ScienceDirect 等数据库收录! |
|