Secrecy for bounded security protocols with freshness check is NEXPTIME-complete

  • Authors:
  • Ferucio L. Ţiplea;Cătălin V. Bîrjoveanu;Constantin Enea;Ioana Boureanu

  • Affiliations:
  • Department of Computer Science, “Al.I.Cuza” University of Iaşi, Iaşi, Romania and School of Computer Science, University of Central Florida, Orlando, FL 32816, USA. E-mail: f ...;Department of Computer Science, “Al.I.Cuza” University of Iaşi, Iaşi, Romania. E-mails: {fltiplea, cbirjoveanu, cenea, iboureanu}@infoiasi.ro;Department of Computer Science, “Al.I.Cuza” University of Iaşi, Iaşi, Romania. E-mails: {fltiplea, cbirjoveanu, cenea, iboureanu}@infoiasi.ro;Department of Computer Science, “Al.I.Cuza” University of Iaşi, Iaşi, Romania. E-mails: {fltiplea, cbirjoveanu, cenea, iboureanu}@infoiasi.ro

  • Venue:
  • Journal of Computer Security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The secrecy problem for security protocols is the problem to decide whether or not a given security protocol has leaky runs. In this paper, the (initial) secrecy problem for bounded protocols with freshness check is shown to be NEXPTIME-complete. Relating the formalism in this paper to the multiset rewriting (MSR) formalism we obtain that the initial secrecy problem for protocols in restricted form, with bounded length messages, bounded existentials, with or without disequality tests, and an intruder with no existentials, is NEXPTIME-complete. If existentials for the intruder are allowed but disequality tests are not allowed, the initial secrecy problem still is NEXPTIME-complete. However, if both existentials for the intruder and disequality tests are allowed and the protocols are not well-founded (and, therefore, not in restricted form), then the problem is undecidable. These results also correct some wrong statements in Durgin et al., JCS 12 (2004), 247-311.