Skip to main content

Trace equivalence decision: negative tests and non−determinism

Vincent Cheval‚ Hubert Comon−Lundh and Stéphanie Delaune

Abstract

We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-type properties, like anonymity, vote-privacy, and unlinkability.

In this paper, we give a calculus that is close to the applied pi calculus and that allows one to capture most existing protocols that rely on classical cryptographic primitives. First, we propose a symbolic semantics for our calculus relying on constraint systems to represent infinite sets of possible traces, and we reduce the decidability of trace equivalence to deciding a notion of symbolic equivalence between sets of constraint systems. Second, we develop an algorithm allowing us to decide whether two sets of constraint systems are in symbolic equivalence or not. Altogether, this yields the first decidability result of trace equivalence for a general class of processes that may involve else branches and/or private channels (for a bounded number of sessions).

Book Title
Proceedings of the 18th ACM Conference on Computer and Communications Security‚ CCS 2011‚ Chicago‚ Illinois‚ USA‚ October 17−21‚ 2011
Editor
Yan Chen and George Danezis and Vitaly Shmatikov
Pages
321–330
Publisher
ACM
Year
2011