Abstract We formalize the Dolev-Yao model of security protocols using two different notations, one based on multiset rewriting with existentials, and the other based on a …
This paper contributes to further closing the gap between formal analysis and concrete implementations of security protocols by introducing a quantitative extension of the usual …
We propose a protocol model which integrates two different ways of analyzing cryptographic protocols: i) analysis wrt an unbounded number of sessions and bounded message size …
While the verification of security protocols has been proved to be undecidable in general, several approaches use simplifying hypotheses in order to obtain decidability for interesting …
B Blanchet - arXiv preprint arXiv:2310.14658, 2023 - arxiv.org
This document presents the security protocol verifier CryptoVerif. CryptoVerif does not rely on the symbolic, Dolev-Yao model, but on the computational model. It can verify secrecy …
N Durgin, P Lincoln, J Mitchell… - Journal of Computer …, 2004 - content.iospress.com
Abstract We formalize the Dolev–Yao model of security protocols, using a notation based on multiset rewriting with existentials. The goals are to provide a simple formal notation for …
B Blanchet - IEEE Transactions on Dependable and Secure …, 2008 - ieeexplore.ieee.org
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the …
R Chadha, AP Sistla… - 2017 32nd Annual ACM …, 2017 - ieeexplore.ieee.org
We consider the problem of verifying the security of finitely many sessions of a protocol that tosses coins in addition to standard cryptographic primitives against a Dolev-Yao adversary …
R Küsters, T Wilke - Information and Computation, 2007 - Elsevier
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for …