Title
Cap unification: application to protocol security modulo homomorphic encryption
Abstract
We address the insecurity problem for cryptographic protocols, for an active intruder and a bounded number of sessions. The protocol steps are modeled as rigid Horn clauses, and the intruder abilities as an equational theory. The problem of active intrusion -- such as whether a secret term can be derived, possibly via interaction with the honest participants of the protocol -- is then formulated as a Cap Unification problem. Cap Unification is an extension of Equational Unification: look for a cap to be placed on a given set of terms, so as to unify it with a given term modulo the equational theory. We give a decision procedure for Cap Unification, when the intruder capabilities are modeled as homomorphic encryption theory. Our procedure can be employed in a simple manner to detect attacks exploiting some properties of block ciphers.
Year
DOI
Venue
2010
10.1145/1755688.1755713
ASIACCS
Keywords
Field
DocType
protocol security modulo homomorphic,cap unification,insecurity problem,active intruder,intruder capability,cap unification problem,intruder ability,homomorphic encryption theory,active intrusion,equational unification,equational theory,homomorphic encryption,protocol,cryptographic protocol,block cipher,rewriting,unification
Homomorphic encryption,Horn clause,Cryptographic protocol,Block cipher,Computer science,Modulo,Unification,Computer security,Theoretical computer science,Rewriting,Bounded function
Conference
Citations 
PageRank 
References 
4
0.44
17
Authors
5
Name
Order
Citations
PageRank
Siva Anantharaman110410.87
Hai Lin2232.96
Christopher Lynch3273.62
Paliath Narendran41100114.99
Michael Rusinowitch539033.33