2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS)
Download PDF

Abstract

Many decision problems on security protocols can be reduced to solving so-called intruder constraints in Dolev Yao model. Most constraint solving procedures for protocol security rely on two properties of constraint systems called monotonicity and variable-origination. In this work we relax these restrictions by giving an NP decision procedure for solving general intruder constraints (that do not have these properties). Our result extends a first work by L. Mazaré in several directions: we allow non-atomic keys, and an associative, commutative and idempotent symbol (for modeling sets). We also give several new applications of the result.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!

Related Articles