Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES

Identifieur interne : 000874 ( PascalFrancis/Curation ); précédent : 000873; suivant : 000875

DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES

Auteurs : Mouhebeddine Berrima [Tunisie] ; Narjes Ben Rajeb [Tunisie] ; Véronique Cortier [France]

Source :

RBID : Pascal:11-0430408

Descripteurs français

English descriptors

Abstract

In the last decade, formal methods have proved their interest when analyzing security protocols. Security protocols require in particular to reason about the attacker knowledge. Two standard notions are often considered in formal approaches: deducibility and indistinguishability relations. The first notion states whether an attacker can learn the value of a secret, while the latter states whether an attacker can notice some difference between protocol runs with different values of the secret. Several decision procedures have been developed so far for both notions but none of them can be applied in the context of e-voting protocols, which require dedicated cryptographic primitives. In this work, we show that both deduction and indistinguishability are decidable in polynomial time for two theories modeling the primitives of e-voting protocols.
pA  
A01 01  1    @0 0988-3754
A02 01      @0 RITAE4
A03   1    @0 Inform. théor. appl. : (Imprimé
A05       @2 45
A06       @2 3
A08 01  1  ENG  @1 DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES
A11 01  1    @1 BERRIMA (Mouhebeddine)
A11 02  1    @1 BEN RAJEB (Narjes)
A11 03  1    @1 CORTIER (Véronique)
A14 01      @1 LIP2, Faculté des Sciences @2 Tunis @3 TUN @Z 1 aut.
A14 02      @1 LIP2, Institut National des Sciences Appliquées et de Technologie @2 Tunis @3 TUN @Z 2 aut.
A14 03      @1 Loria, INRIA & CNRS @2 Nancy @3 FRA @Z 3 aut.
A20       @1 269-299
A21       @1 2011
A23 01      @0 ENG
A43 01      @1 INIST @2 9323B2 @5 354000191236790010
A44       @0 0000 @1 © 2011 INIST-CNRS. All rights reserved.
A45       @0 21 ref.
A47 01  1    @0 11-0430408
A60       @1 P
A61       @0 A
A64 01  1    @0 Informatique théorique et applications : (Imprimé)
A66 01      @0 FRA
C01 01    ENG  @0 In the last decade, formal methods have proved their interest when analyzing security protocols. Security protocols require in particular to reason about the attacker knowledge. Two standard notions are often considered in formal approaches: deducibility and indistinguishability relations. The first notion states whether an attacker can learn the value of a secret, while the latter states whether an attacker can notice some difference between protocol runs with different values of the secret. Several decision procedures have been developed so far for both notions but none of them can be applied in the context of e-voting protocols, which require dedicated cryptographic primitives. In this work, we show that both deduction and indistinguishability are decidable in polynomial time for two theories modeling the primitives of e-voting protocols.
C02 01  X    @0 001D02A08
C02 02  X    @0 001D02C02
C03 01  X  FRE  @0 Informatique théorique @5 01
C03 01  X  ENG  @0 Computer theory @5 01
C03 01  X  SPA  @0 Informática teórica @5 01
C03 02  X  FRE  @0 Connaissance @5 17
C03 02  X  ENG  @0 Knowledge @5 17
C03 02  X  SPA  @0 Conocimiento @5 17
C03 03  X  FRE  @0 Méthode formelle @5 18
C03 03  X  ENG  @0 Formal method @5 18
C03 03  X  SPA  @0 Método formal @5 18
C03 04  X  FRE  @0 Vote @5 19
C03 04  X  ENG  @0 Voting @5 19
C03 04  X  SPA  @0 Voto @5 19
C03 05  X  FRE  @0 Primitif @5 20
C03 05  X  ENG  @0 Primitive @5 20
C03 05  X  SPA  @0 Primitivo @5 20
C03 06  X  FRE  @0 Déduction @5 21
C03 06  X  ENG  @0 Deduction @5 21
C03 06  X  SPA  @0 Deducción @5 21
C03 07  X  FRE  @0 Temps polynomial @5 22
C03 07  X  ENG  @0 Polynomial time @5 22
C03 07  X  SPA  @0 Tiempo polinomial @5 22
C03 08  X  FRE  @0 Modélisation @5 23
C03 08  X  ENG  @0 Modeling @5 23
C03 08  X  SPA  @0 Modelización @5 23
C03 09  X  FRE  @0 Décidabilité @5 24
C03 09  X  ENG  @0 Decidability @5 24
C03 09  X  SPA  @0 Decidibilidad @5 24
C03 10  X  FRE  @0 Théorie équationnelle @5 25
C03 10  X  ENG  @0 Equational theory @5 25
C03 10  X  SPA  @0 Teoría ecuaciónal @5 25
C03 11  X  FRE  @0 Procédure décision @4 INC @5 70
C03 12  X  FRE  @0 68T15 @4 INC @5 71
C03 13  X  FRE  @0 Protocole sécurité @4 CD @5 96
C03 13  X  ENG  @0 Security protocol @4 CD @5 96
C03 14  X  FRE  @0 Théorie vote @4 CD @5 97
C03 14  X  ENG  @0 Voting theory @4 CD @5 97
C03 15  X  FRE  @0 Protocole cryptographique @4 CD @5 98
C03 15  X  ENG  @0 Cryptographic protocol @4 CD @5 98
N21       @1 297
N44 01      @1 OTO
N82       @1 OTO

Links toward previous steps (curation, corpus...)


Links to Exploration step

Pascal:11-0430408

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en" level="a">DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES</title>
<author>
<name sortKey="Berrima, Mouhebeddine" sort="Berrima, Mouhebeddine" uniqKey="Berrima M" first="Mouhebeddine" last="Berrima">Mouhebeddine Berrima</name>
<affiliation wicri:level="1">
<inist:fA14 i1="01">
<s1>LIP2, Faculté des Sciences</s1>
<s2>Tunis</s2>
<s3>TUN</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
<country>Tunisie</country>
</affiliation>
</author>
<author>
<name sortKey="Ben Rajeb, Narjes" sort="Ben Rajeb, Narjes" uniqKey="Ben Rajeb N" first="Narjes" last="Ben Rajeb">Narjes Ben Rajeb</name>
<affiliation wicri:level="1">
<inist:fA14 i1="02">
<s1>LIP2, Institut National des Sciences Appliquées et de Technologie</s1>
<s2>Tunis</s2>
<s3>TUN</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
<country>Tunisie</country>
</affiliation>
</author>
<author>
<name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
<affiliation wicri:level="1">
<inist:fA14 i1="03">
<s1>Loria, INRIA & CNRS</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
<country>France</country>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">INIST</idno>
<idno type="inist">11-0430408</idno>
<date when="2011">2011</date>
<idno type="stanalyst">PASCAL 11-0430408 INIST</idno>
<idno type="RBID">Pascal:11-0430408</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000139</idno>
<idno type="wicri:Area/PascalFrancis/Curation">000874</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a">DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES</title>
<author>
<name sortKey="Berrima, Mouhebeddine" sort="Berrima, Mouhebeddine" uniqKey="Berrima M" first="Mouhebeddine" last="Berrima">Mouhebeddine Berrima</name>
<affiliation wicri:level="1">
<inist:fA14 i1="01">
<s1>LIP2, Faculté des Sciences</s1>
<s2>Tunis</s2>
<s3>TUN</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
<country>Tunisie</country>
</affiliation>
</author>
<author>
<name sortKey="Ben Rajeb, Narjes" sort="Ben Rajeb, Narjes" uniqKey="Ben Rajeb N" first="Narjes" last="Ben Rajeb">Narjes Ben Rajeb</name>
<affiliation wicri:level="1">
<inist:fA14 i1="02">
<s1>LIP2, Institut National des Sciences Appliquées et de Technologie</s1>
<s2>Tunis</s2>
<s3>TUN</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
<country>Tunisie</country>
</affiliation>
</author>
<author>
<name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
<affiliation wicri:level="1">
<inist:fA14 i1="03">
<s1>Loria, INRIA & CNRS</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
<country>France</country>
</affiliation>
</author>
</analytic>
<series>
<title level="j" type="main">Informatique théorique et applications : (Imprimé)</title>
<title level="j" type="abbreviated">Inform. théor. appl. : (Imprimé</title>
<idno type="ISSN">0988-3754</idno>
<imprint>
<date when="2011">2011</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<title level="j" type="main">Informatique théorique et applications : (Imprimé)</title>
<title level="j" type="abbreviated">Inform. théor. appl. : (Imprimé</title>
<idno type="ISSN">0988-3754</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Computer theory</term>
<term>Cryptographic protocol</term>
<term>Decidability</term>
<term>Deduction</term>
<term>Equational theory</term>
<term>Formal method</term>
<term>Knowledge</term>
<term>Modeling</term>
<term>Polynomial time</term>
<term>Primitive</term>
<term>Security protocol</term>
<term>Voting</term>
<term>Voting theory</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr">
<term>Informatique théorique</term>
<term>Connaissance</term>
<term>Méthode formelle</term>
<term>Vote</term>
<term>Primitif</term>
<term>Déduction</term>
<term>Temps polynomial</term>
<term>Modélisation</term>
<term>Décidabilité</term>
<term>Théorie équationnelle</term>
<term>Procédure décision</term>
<term>68T15</term>
<term>Protocole sécurité</term>
<term>Théorie vote</term>
<term>Protocole cryptographique</term>
</keywords>
<keywords scheme="Wicri" type="topic" xml:lang="fr">
<term>Vote</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">In the last decade, formal methods have proved their interest when analyzing security protocols. Security protocols require in particular to reason about the attacker knowledge. Two standard notions are often considered in formal approaches: deducibility and indistinguishability relations. The first notion states whether an attacker can learn the value of a secret, while the latter states whether an attacker can notice some difference between protocol runs with different values of the secret. Several decision procedures have been developed so far for both notions but none of them can be applied in the context of e-voting protocols, which require dedicated cryptographic primitives. In this work, we show that both deduction and indistinguishability are decidable in polynomial time for two theories modeling the primitives of e-voting protocols.</div>
</front>
</TEI>
<inist>
<standard h6="B">
<pA>
<fA01 i1="01" i2="1">
<s0>0988-3754</s0>
</fA01>
<fA02 i1="01">
<s0>RITAE4</s0>
</fA02>
<fA03 i2="1">
<s0>Inform. théor. appl. : (Imprimé</s0>
</fA03>
<fA05>
<s2>45</s2>
</fA05>
<fA06>
<s2>3</s2>
</fA06>
<fA08 i1="01" i2="1" l="ENG">
<s1>DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES</s1>
</fA08>
<fA11 i1="01" i2="1">
<s1>BERRIMA (Mouhebeddine)</s1>
</fA11>
<fA11 i1="02" i2="1">
<s1>BEN RAJEB (Narjes)</s1>
</fA11>
<fA11 i1="03" i2="1">
<s1>CORTIER (Véronique)</s1>
</fA11>
<fA14 i1="01">
<s1>LIP2, Faculté des Sciences</s1>
<s2>Tunis</s2>
<s3>TUN</s3>
<sZ>1 aut.</sZ>
</fA14>
<fA14 i1="02">
<s1>LIP2, Institut National des Sciences Appliquées et de Technologie</s1>
<s2>Tunis</s2>
<s3>TUN</s3>
<sZ>2 aut.</sZ>
</fA14>
<fA14 i1="03">
<s1>Loria, INRIA & CNRS</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
</fA14>
<fA20>
<s1>269-299</s1>
</fA20>
<fA21>
<s1>2011</s1>
</fA21>
<fA23 i1="01">
<s0>ENG</s0>
</fA23>
<fA43 i1="01">
<s1>INIST</s1>
<s2>9323B2</s2>
<s5>354000191236790010</s5>
</fA43>
<fA44>
<s0>0000</s0>
<s1>© 2011 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45>
<s0>21 ref.</s0>
</fA45>
<fA47 i1="01" i2="1">
<s0>11-0430408</s0>
</fA47>
<fA60>
<s1>P</s1>
</fA60>
<fA61>
<s0>A</s0>
</fA61>
<fA64 i1="01" i2="1">
<s0>Informatique théorique et applications : (Imprimé)</s0>
</fA64>
<fA66 i1="01">
<s0>FRA</s0>
</fA66>
<fC01 i1="01" l="ENG">
<s0>In the last decade, formal methods have proved their interest when analyzing security protocols. Security protocols require in particular to reason about the attacker knowledge. Two standard notions are often considered in formal approaches: deducibility and indistinguishability relations. The first notion states whether an attacker can learn the value of a secret, while the latter states whether an attacker can notice some difference between protocol runs with different values of the secret. Several decision procedures have been developed so far for both notions but none of them can be applied in the context of e-voting protocols, which require dedicated cryptographic primitives. In this work, we show that both deduction and indistinguishability are decidable in polynomial time for two theories modeling the primitives of e-voting protocols.</s0>
</fC01>
<fC02 i1="01" i2="X">
<s0>001D02A08</s0>
</fC02>
<fC02 i1="02" i2="X">
<s0>001D02C02</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE">
<s0>Informatique théorique</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG">
<s0>Computer theory</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA">
<s0>Informática teórica</s0>
<s5>01</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE">
<s0>Connaissance</s0>
<s5>17</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG">
<s0>Knowledge</s0>
<s5>17</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA">
<s0>Conocimiento</s0>
<s5>17</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE">
<s0>Méthode formelle</s0>
<s5>18</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG">
<s0>Formal method</s0>
<s5>18</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA">
<s0>Método formal</s0>
<s5>18</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE">
<s0>Vote</s0>
<s5>19</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG">
<s0>Voting</s0>
<s5>19</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA">
<s0>Voto</s0>
<s5>19</s5>
</fC03>
<fC03 i1="05" i2="X" l="FRE">
<s0>Primitif</s0>
<s5>20</s5>
</fC03>
<fC03 i1="05" i2="X" l="ENG">
<s0>Primitive</s0>
<s5>20</s5>
</fC03>
<fC03 i1="05" i2="X" l="SPA">
<s0>Primitivo</s0>
<s5>20</s5>
</fC03>
<fC03 i1="06" i2="X" l="FRE">
<s0>Déduction</s0>
<s5>21</s5>
</fC03>
<fC03 i1="06" i2="X" l="ENG">
<s0>Deduction</s0>
<s5>21</s5>
</fC03>
<fC03 i1="06" i2="X" l="SPA">
<s0>Deducción</s0>
<s5>21</s5>
</fC03>
<fC03 i1="07" i2="X" l="FRE">
<s0>Temps polynomial</s0>
<s5>22</s5>
</fC03>
<fC03 i1="07" i2="X" l="ENG">
<s0>Polynomial time</s0>
<s5>22</s5>
</fC03>
<fC03 i1="07" i2="X" l="SPA">
<s0>Tiempo polinomial</s0>
<s5>22</s5>
</fC03>
<fC03 i1="08" i2="X" l="FRE">
<s0>Modélisation</s0>
<s5>23</s5>
</fC03>
<fC03 i1="08" i2="X" l="ENG">
<s0>Modeling</s0>
<s5>23</s5>
</fC03>
<fC03 i1="08" i2="X" l="SPA">
<s0>Modelización</s0>
<s5>23</s5>
</fC03>
<fC03 i1="09" i2="X" l="FRE">
<s0>Décidabilité</s0>
<s5>24</s5>
</fC03>
<fC03 i1="09" i2="X" l="ENG">
<s0>Decidability</s0>
<s5>24</s5>
</fC03>
<fC03 i1="09" i2="X" l="SPA">
<s0>Decidibilidad</s0>
<s5>24</s5>
</fC03>
<fC03 i1="10" i2="X" l="FRE">
<s0>Théorie équationnelle</s0>
<s5>25</s5>
</fC03>
<fC03 i1="10" i2="X" l="ENG">
<s0>Equational theory</s0>
<s5>25</s5>
</fC03>
<fC03 i1="10" i2="X" l="SPA">
<s0>Teoría ecuaciónal</s0>
<s5>25</s5>
</fC03>
<fC03 i1="11" i2="X" l="FRE">
<s0>Procédure décision</s0>
<s4>INC</s4>
<s5>70</s5>
</fC03>
<fC03 i1="12" i2="X" l="FRE">
<s0>68T15</s0>
<s4>INC</s4>
<s5>71</s5>
</fC03>
<fC03 i1="13" i2="X" l="FRE">
<s0>Protocole sécurité</s0>
<s4>CD</s4>
<s5>96</s5>
</fC03>
<fC03 i1="13" i2="X" l="ENG">
<s0>Security protocol</s0>
<s4>CD</s4>
<s5>96</s5>
</fC03>
<fC03 i1="14" i2="X" l="FRE">
<s0>Théorie vote</s0>
<s4>CD</s4>
<s5>97</s5>
</fC03>
<fC03 i1="14" i2="X" l="ENG">
<s0>Voting theory</s0>
<s4>CD</s4>
<s5>97</s5>
</fC03>
<fC03 i1="15" i2="X" l="FRE">
<s0>Protocole cryptographique</s0>
<s4>CD</s4>
<s5>98</s5>
</fC03>
<fC03 i1="15" i2="X" l="ENG">
<s0>Cryptographic protocol</s0>
<s4>CD</s4>
<s5>98</s5>
</fC03>
<fN21>
<s1>297</s1>
</fN21>
<fN44 i1="01">
<s1>OTO</s1>
</fN44>
<fN82>
<s1>OTO</s1>
</fN82>
</pA>
</standard>
</inist>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/PascalFrancis/Curation
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000874 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Curation/biblio.hfd -nk 000874 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    PascalFrancis
   |étape=   Curation
   |type=    RBID
   |clé=     Pascal:11-0430408
   |texte=   DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022