DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES
Identifieur interne : 000139 ( PascalFrancis/Corpus ); précédent : 000138; suivant : 000140DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES
Auteurs : Mouhebeddine Berrima ; Narjes Ben Rajeb ; Véronique CortierSource :
- Informatique théorique et applications : (Imprimé) [ 0988-3754 ] ; 2011.
Descripteurs français
- Pascal (Inist)
English descriptors
- KwdEn :
Abstract
In the last decade, formal methods have proved their interest when analyzing security protocols. Security protocols require in particular to reason about the attacker knowledge. Two standard notions are often considered in formal approaches: deducibility and indistinguishability relations. The first notion states whether an attacker can learn the value of a secret, while the latter states whether an attacker can notice some difference between protocol runs with different values of the secret. Several decision procedures have been developed so far for both notions but none of them can be applied in the context of e-voting protocols, which require dedicated cryptographic primitives. In this work, we show that both deduction and indistinguishability are decidable in polynomial time for two theories modeling the primitives of e-voting protocols.
Notice en format standard (ISO 2709)
Pour connaître la documentation sur le format Inist Standard.
pA |
|
---|
Format Inist (serveur)
NO : | PASCAL 11-0430408 INIST |
---|---|
ET : | DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES |
AU : | BERRIMA (Mouhebeddine); BEN RAJEB (Narjes); CORTIER (Véronique) |
AF : | LIP2, Faculté des Sciences/Tunis/Tunisie (1 aut.); LIP2, Institut National des Sciences Appliquées et de Technologie/Tunis/Tunisie (2 aut.); Loria, INRIA & CNRS/Nancy/France (3 aut.) |
DT : | Publication en série; Niveau analytique |
SO : | Informatique théorique et applications : (Imprimé); ISSN 0988-3754; Coden RITAE4; France; Da. 2011; Vol. 45; No. 3; Pp. 269-299; Bibl. 21 ref. |
LA : | Anglais |
EA : | In the last decade, formal methods have proved their interest when analyzing security protocols. Security protocols require in particular to reason about the attacker knowledge. Two standard notions are often considered in formal approaches: deducibility and indistinguishability relations. The first notion states whether an attacker can learn the value of a secret, while the latter states whether an attacker can notice some difference between protocol runs with different values of the secret. Several decision procedures have been developed so far for both notions but none of them can be applied in the context of e-voting protocols, which require dedicated cryptographic primitives. In this work, we show that both deduction and indistinguishability are decidable in polynomial time for two theories modeling the primitives of e-voting protocols. |
CC : | 001D02A08; 001D02C02 |
FD : | Informatique théorique; Connaissance; Méthode formelle; Vote; Primitif; Déduction; Temps polynomial; Modélisation; Décidabilité; Théorie équationnelle; Procédure décision; 68T15; Protocole sécurité; Théorie vote; Protocole cryptographique |
ED : | Computer theory; Knowledge; Formal method; Voting; Primitive; Deduction; Polynomial time; Modeling; Decidability; Equational theory; Security protocol; Voting theory; Cryptographic protocol |
SD : | Informática teórica; Conocimiento; Método formal; Voto; Primitivo; Deducción; Tiempo polinomial; Modelización; Decidibilidad; Teoría ecuaciónal |
LO : | INIST-9323B2.354000191236790010 |
ID : | 11-0430408 |
Links to Exploration step
Pascal:11-0430408Le document en format XML
<record><TEI><teiHeader><fileDesc><titleStmt><title xml:lang="en" level="a">DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES</title>
<author><name sortKey="Berrima, Mouhebeddine" sort="Berrima, Mouhebeddine" uniqKey="Berrima M" first="Mouhebeddine" last="Berrima">Mouhebeddine Berrima</name>
<affiliation><inist:fA14 i1="01"><s1>LIP2, Faculté des Sciences</s1>
<s2>Tunis</s2>
<s3>TUN</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Ben Rajeb, Narjes" sort="Ben Rajeb, Narjes" uniqKey="Ben Rajeb N" first="Narjes" last="Ben Rajeb">Narjes Ben Rajeb</name>
<affiliation><inist:fA14 i1="02"><s1>LIP2, Institut National des Sciences Appliquées et de Technologie</s1>
<s2>Tunis</s2>
<s3>TUN</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
<affiliation><inist:fA14 i1="03"><s1>Loria, INRIA & CNRS</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">INIST</idno>
<idno type="inist">11-0430408</idno>
<date when="2011">2011</date>
<idno type="stanalyst">PASCAL 11-0430408 INIST</idno>
<idno type="RBID">Pascal:11-0430408</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000139</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title xml:lang="en" level="a">DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES</title>
<author><name sortKey="Berrima, Mouhebeddine" sort="Berrima, Mouhebeddine" uniqKey="Berrima M" first="Mouhebeddine" last="Berrima">Mouhebeddine Berrima</name>
<affiliation><inist:fA14 i1="01"><s1>LIP2, Faculté des Sciences</s1>
<s2>Tunis</s2>
<s3>TUN</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Ben Rajeb, Narjes" sort="Ben Rajeb, Narjes" uniqKey="Ben Rajeb N" first="Narjes" last="Ben Rajeb">Narjes Ben Rajeb</name>
<affiliation><inist:fA14 i1="02"><s1>LIP2, Institut National des Sciences Appliquées et de Technologie</s1>
<s2>Tunis</s2>
<s3>TUN</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
<affiliation><inist:fA14 i1="03"><s1>Loria, INRIA & CNRS</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</analytic>
<series><title level="j" type="main">Informatique théorique et applications : (Imprimé)</title>
<title level="j" type="abbreviated">Inform. théor. appl. : (Imprimé</title>
<idno type="ISSN">0988-3754</idno>
<imprint><date when="2011">2011</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt><title level="j" type="main">Informatique théorique et applications : (Imprimé)</title>
<title level="j" type="abbreviated">Inform. théor. appl. : (Imprimé</title>
<idno type="ISSN">0988-3754</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass><keywords scheme="KwdEn" xml:lang="en"><term>Computer theory</term>
<term>Cryptographic protocol</term>
<term>Decidability</term>
<term>Deduction</term>
<term>Equational theory</term>
<term>Formal method</term>
<term>Knowledge</term>
<term>Modeling</term>
<term>Polynomial time</term>
<term>Primitive</term>
<term>Security protocol</term>
<term>Voting</term>
<term>Voting theory</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr"><term>Informatique théorique</term>
<term>Connaissance</term>
<term>Méthode formelle</term>
<term>Vote</term>
<term>Primitif</term>
<term>Déduction</term>
<term>Temps polynomial</term>
<term>Modélisation</term>
<term>Décidabilité</term>
<term>Théorie équationnelle</term>
<term>Procédure décision</term>
<term>68T15</term>
<term>Protocole sécurité</term>
<term>Théorie vote</term>
<term>Protocole cryptographique</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">In the last decade, formal methods have proved their interest when analyzing security protocols. Security protocols require in particular to reason about the attacker knowledge. Two standard notions are often considered in formal approaches: deducibility and indistinguishability relations. The first notion states whether an attacker can learn the value of a secret, while the latter states whether an attacker can notice some difference between protocol runs with different values of the secret. Several decision procedures have been developed so far for both notions but none of them can be applied in the context of e-voting protocols, which require dedicated cryptographic primitives. In this work, we show that both deduction and indistinguishability are decidable in polynomial time for two theories modeling the primitives of e-voting protocols.</div>
</front>
</TEI>
<inist><standard h6="B"><pA><fA01 i1="01" i2="1"><s0>0988-3754</s0>
</fA01>
<fA02 i1="01"><s0>RITAE4</s0>
</fA02>
<fA03 i2="1"><s0>Inform. théor. appl. : (Imprimé</s0>
</fA03>
<fA05><s2>45</s2>
</fA05>
<fA06><s2>3</s2>
</fA06>
<fA08 i1="01" i2="1" l="ENG"><s1>DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES</s1>
</fA08>
<fA11 i1="01" i2="1"><s1>BERRIMA (Mouhebeddine)</s1>
</fA11>
<fA11 i1="02" i2="1"><s1>BEN RAJEB (Narjes)</s1>
</fA11>
<fA11 i1="03" i2="1"><s1>CORTIER (Véronique)</s1>
</fA11>
<fA14 i1="01"><s1>LIP2, Faculté des Sciences</s1>
<s2>Tunis</s2>
<s3>TUN</s3>
<sZ>1 aut.</sZ>
</fA14>
<fA14 i1="02"><s1>LIP2, Institut National des Sciences Appliquées et de Technologie</s1>
<s2>Tunis</s2>
<s3>TUN</s3>
<sZ>2 aut.</sZ>
</fA14>
<fA14 i1="03"><s1>Loria, INRIA & CNRS</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
</fA14>
<fA20><s1>269-299</s1>
</fA20>
<fA21><s1>2011</s1>
</fA21>
<fA23 i1="01"><s0>ENG</s0>
</fA23>
<fA43 i1="01"><s1>INIST</s1>
<s2>9323B2</s2>
<s5>354000191236790010</s5>
</fA43>
<fA44><s0>0000</s0>
<s1>© 2011 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45><s0>21 ref.</s0>
</fA45>
<fA47 i1="01" i2="1"><s0>11-0430408</s0>
</fA47>
<fA60><s1>P</s1>
</fA60>
<fA61><s0>A</s0>
</fA61>
<fA64 i1="01" i2="1"><s0>Informatique théorique et applications : (Imprimé)</s0>
</fA64>
<fA66 i1="01"><s0>FRA</s0>
</fA66>
<fC01 i1="01" l="ENG"><s0>In the last decade, formal methods have proved their interest when analyzing security protocols. Security protocols require in particular to reason about the attacker knowledge. Two standard notions are often considered in formal approaches: deducibility and indistinguishability relations. The first notion states whether an attacker can learn the value of a secret, while the latter states whether an attacker can notice some difference between protocol runs with different values of the secret. Several decision procedures have been developed so far for both notions but none of them can be applied in the context of e-voting protocols, which require dedicated cryptographic primitives. In this work, we show that both deduction and indistinguishability are decidable in polynomial time for two theories modeling the primitives of e-voting protocols.</s0>
</fC01>
<fC02 i1="01" i2="X"><s0>001D02A08</s0>
</fC02>
<fC02 i1="02" i2="X"><s0>001D02C02</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE"><s0>Informatique théorique</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG"><s0>Computer theory</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA"><s0>Informática teórica</s0>
<s5>01</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE"><s0>Connaissance</s0>
<s5>17</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG"><s0>Knowledge</s0>
<s5>17</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA"><s0>Conocimiento</s0>
<s5>17</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE"><s0>Méthode formelle</s0>
<s5>18</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG"><s0>Formal method</s0>
<s5>18</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA"><s0>Método formal</s0>
<s5>18</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE"><s0>Vote</s0>
<s5>19</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG"><s0>Voting</s0>
<s5>19</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA"><s0>Voto</s0>
<s5>19</s5>
</fC03>
<fC03 i1="05" i2="X" l="FRE"><s0>Primitif</s0>
<s5>20</s5>
</fC03>
<fC03 i1="05" i2="X" l="ENG"><s0>Primitive</s0>
<s5>20</s5>
</fC03>
<fC03 i1="05" i2="X" l="SPA"><s0>Primitivo</s0>
<s5>20</s5>
</fC03>
<fC03 i1="06" i2="X" l="FRE"><s0>Déduction</s0>
<s5>21</s5>
</fC03>
<fC03 i1="06" i2="X" l="ENG"><s0>Deduction</s0>
<s5>21</s5>
</fC03>
<fC03 i1="06" i2="X" l="SPA"><s0>Deducción</s0>
<s5>21</s5>
</fC03>
<fC03 i1="07" i2="X" l="FRE"><s0>Temps polynomial</s0>
<s5>22</s5>
</fC03>
<fC03 i1="07" i2="X" l="ENG"><s0>Polynomial time</s0>
<s5>22</s5>
</fC03>
<fC03 i1="07" i2="X" l="SPA"><s0>Tiempo polinomial</s0>
<s5>22</s5>
</fC03>
<fC03 i1="08" i2="X" l="FRE"><s0>Modélisation</s0>
<s5>23</s5>
</fC03>
<fC03 i1="08" i2="X" l="ENG"><s0>Modeling</s0>
<s5>23</s5>
</fC03>
<fC03 i1="08" i2="X" l="SPA"><s0>Modelización</s0>
<s5>23</s5>
</fC03>
<fC03 i1="09" i2="X" l="FRE"><s0>Décidabilité</s0>
<s5>24</s5>
</fC03>
<fC03 i1="09" i2="X" l="ENG"><s0>Decidability</s0>
<s5>24</s5>
</fC03>
<fC03 i1="09" i2="X" l="SPA"><s0>Decidibilidad</s0>
<s5>24</s5>
</fC03>
<fC03 i1="10" i2="X" l="FRE"><s0>Théorie équationnelle</s0>
<s5>25</s5>
</fC03>
<fC03 i1="10" i2="X" l="ENG"><s0>Equational theory</s0>
<s5>25</s5>
</fC03>
<fC03 i1="10" i2="X" l="SPA"><s0>Teoría ecuaciónal</s0>
<s5>25</s5>
</fC03>
<fC03 i1="11" i2="X" l="FRE"><s0>Procédure décision</s0>
<s4>INC</s4>
<s5>70</s5>
</fC03>
<fC03 i1="12" i2="X" l="FRE"><s0>68T15</s0>
<s4>INC</s4>
<s5>71</s5>
</fC03>
<fC03 i1="13" i2="X" l="FRE"><s0>Protocole sécurité</s0>
<s4>CD</s4>
<s5>96</s5>
</fC03>
<fC03 i1="13" i2="X" l="ENG"><s0>Security protocol</s0>
<s4>CD</s4>
<s5>96</s5>
</fC03>
<fC03 i1="14" i2="X" l="FRE"><s0>Théorie vote</s0>
<s4>CD</s4>
<s5>97</s5>
</fC03>
<fC03 i1="14" i2="X" l="ENG"><s0>Voting theory</s0>
<s4>CD</s4>
<s5>97</s5>
</fC03>
<fC03 i1="15" i2="X" l="FRE"><s0>Protocole cryptographique</s0>
<s4>CD</s4>
<s5>98</s5>
</fC03>
<fC03 i1="15" i2="X" l="ENG"><s0>Cryptographic protocol</s0>
<s4>CD</s4>
<s5>98</s5>
</fC03>
<fN21><s1>297</s1>
</fN21>
<fN44 i1="01"><s1>OTO</s1>
</fN44>
<fN82><s1>OTO</s1>
</fN82>
</pA>
</standard>
<server><NO>PASCAL 11-0430408 INIST</NO>
<ET>DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES</ET>
<AU>BERRIMA (Mouhebeddine); BEN RAJEB (Narjes); CORTIER (Véronique)</AU>
<AF>LIP2, Faculté des Sciences/Tunis/Tunisie (1 aut.); LIP2, Institut National des Sciences Appliquées et de Technologie/Tunis/Tunisie (2 aut.); Loria, INRIA & CNRS/Nancy/France (3 aut.)</AF>
<DT>Publication en série; Niveau analytique</DT>
<SO>Informatique théorique et applications : (Imprimé); ISSN 0988-3754; Coden RITAE4; France; Da. 2011; Vol. 45; No. 3; Pp. 269-299; Bibl. 21 ref.</SO>
<LA>Anglais</LA>
<EA>In the last decade, formal methods have proved their interest when analyzing security protocols. Security protocols require in particular to reason about the attacker knowledge. Two standard notions are often considered in formal approaches: deducibility and indistinguishability relations. The first notion states whether an attacker can learn the value of a secret, while the latter states whether an attacker can notice some difference between protocol runs with different values of the secret. Several decision procedures have been developed so far for both notions but none of them can be applied in the context of e-voting protocols, which require dedicated cryptographic primitives. In this work, we show that both deduction and indistinguishability are decidable in polynomial time for two theories modeling the primitives of e-voting protocols.</EA>
<CC>001D02A08; 001D02C02</CC>
<FD>Informatique théorique; Connaissance; Méthode formelle; Vote; Primitif; Déduction; Temps polynomial; Modélisation; Décidabilité; Théorie équationnelle; Procédure décision; 68T15; Protocole sécurité; Théorie vote; Protocole cryptographique</FD>
<ED>Computer theory; Knowledge; Formal method; Voting; Primitive; Deduction; Polynomial time; Modeling; Decidability; Equational theory; Security protocol; Voting theory; Cryptographic protocol</ED>
<SD>Informática teórica; Conocimiento; Método formal; Voto; Primitivo; Deducción; Tiempo polinomial; Modelización; Decidibilidad; Teoría ecuaciónal</SD>
<LO>INIST-9323B2.354000191236790010</LO>
<ID>11-0430408</ID>
</server>
</inist>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/PascalFrancis/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000139 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Corpus/biblio.hfd -nk 000139 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Lorraine |area= InforLorV4 |flux= PascalFrancis |étape= Corpus |type= RBID |clé= Pascal:11-0430408 |texte= DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES }}
This area was generated with Dilib version V0.6.33. |