Journal article
Symbolic protocol verification with dice
- Abstract:
- Symbolic protocol verification generally abstracts probabilities away, considering computations that succeed only with negligible probability, such as guessing random numbers or breaking an encryption scheme, as impossible. This abstraction, sometimes referred to as the perfect cryptography assumption, has shown very useful as it simplifies automation of the analysis. However, probabilities may also appear in the control flow where they are generally not negligible. In this paper we consider a framework for symbolic protocol analysis with a probabilistic choice operator: the probabilistic applied π-calculus. We define and explore the relationships between several behavioral equivalences. In particular we show the need for randomized schedulers and exhibit a counter-example to a result in a previous work that relied on non-randomized ones. As in other frameworks that mix both non-deterministic and probabilistic choices, schedulers may sometimes be unrealistically powerful. We therefore consider two subclasses of processes that avoid this problem. In particular, when considering purely non-deterministic protocols, as is done in classical symbolic verification, we show that a probabilistic adversary has – maybe surprisingly – a strictly superior distinguishing power for may testing, which, when the number of sessions is bounded, we show to coincide with purely possibilistic similarity.
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Access Document
- Files:
-
-
(Preview, Accepted manuscript, pdf, 414.2KB, Terms of use)
-
- Publisher copy:
- 10.3233/jcs-230037
- Publisher:
- IOS Press
- Journal:
- Journal of Computer Security More from this journal
- Volume:
- 31
- Issue:
- 5
- Pages:
- 501-538
- Publication date:
- 2023-10-13
- Acceptance date:
- 2024-05-25
- DOI:
- EISSN:
-
1875-8924
- ISSN:
-
0926-227X
- Language:
-
English
- Keywords:
- Pubs id:
-
2038675
- Local pid:
-
pubs:2038675
- Deposit date:
-
2024-10-14
Terms of use
- Copyright holder:
- IOS Press
- Copyright date:
- 2023
- Rights statement:
- © 2024 – IOS Press. All rights reserved.
- Notes:
- This is the accepted manuscript version of the article. The final version is available online from IOS Press at https://dx.doi.org/10.3233/jcs-230037
If you are the owner of this record, you can report an update to it here: Report update to this record