privacy-related use cases. One of the key aspects in applying these protocols consists of
proving that they are secure. This paper presents ongoing work on using Automated
Planning for that task. This analysis serves two purposes. On one side, it can help
cryptographic practitioners to analyze some properties of their protocols. On the other hand,
it can help automated planning work on unsolvability to enrich the type of domains they test …