Security properties: two agents are sufficient

  • Authors:
  • Hubert Comon-Lundh;Véronique Cortier

  • Affiliations:
  • Laboratoire Spécification et Vérification, CNRS, INRIA, Ecole Normale Supérieure de Cachan;Laboratoire Spécification et Vérification, CNRS, INRIA, Ecole Normale Supérieure de Cachan

  • Venue:
  • ESOP'03 Proceedings of the 12th European conference on Programming
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

We consider arbitrary cryptographic protocols and security properties. We show that it is always sufficient to consider a bounded number of agents b (actually b = 2 in most of the cases): if there is an attack involving n agents, then there is an attack involving at most b agents.