论文标题
断言的不安全感问题仍然存在于NP中
Insecurity problem for assertions remains in NP
论文作者
论文摘要
在加密协议的符号验证中,一个核心问题是确定协议是否允许执行泄露恶意入侵者指定的秘密。 Rusinowitch和Turuani(2003)表明,当考虑到有限的会话和仅传达术语的协议模型时,这种``不安全感问题''将是NP完整的。他们的证明策略的核心是观察到,任何执行协议的执行都可以由入侵者只能传达有限规模的术语的任何执行。 但是,当我们考虑模型,除了术语外,还可以传达逻辑公式时,对不安全感问题的分析变得棘手。在本文中,我们考虑了具有逻辑陈述的协议的不安全感问题,其中包括术语和存在量化的平等性。存在量化剂的证人可能是无限的规模,并且在维持平等证明的同时获得小的证人会使分析变得复杂。我们使用“键入”平等证明的概念,并将技术从[RT03]扩展出来,以表明此问题也在NP中。我们还表明,这些技术可用于分析Ramanujam,Sundararajan和Suresh(2017)中提出的系统等系统的不安全感问题。
In the symbolic verification of cryptographic protocols, a central problem is deciding whether a protocol admits an execution which leaks a designated secret to the malicious intruder. Rusinowitch and Turuani (2003) show that, when considering finitely many sessions and a protocol model where only terms are communicated, this ``insecurity problem'' is NP-complete. Central to their proof strategy is the observation that any execution of a protocol can be simulated by one where the intruder only communicates terms of bounded size. However, when we consider models where, in addition to terms, one can also communicate logical formulas, the analysis of the insecurity problem becomes tricky. In this paper we consider the insecurity problem for protocols with logical statements that include equality on terms and existential quantification. Witnesses for existential quantifiers may be of unbounded size, and obtaining small witnesses while maintaining equality proofs complicates the analysis. We use a notion of "typed" equality proofs, and extend techniques from [RT03] to show that this problem is also in NP. We also show that these techniques can be used to analyze the insecurity problem for systems such as the one proposed in Ramanujam, Sundararajan and Suresh (2017).