Reduction of equational theories for verification of trace equivalence: re-encryption, associativity and commutativity

  • Authors:
  • Myrto Arapinis;Sergiu Bursuc;Mark D. Ryan

  • Affiliations:
  • School of Computer Science, University of Birmingham, UK;School of Computer Science, University of Birmingham, UK;School of Computer Science, University of Birmingham, UK

  • Venue:
  • POST'12 Proceedings of the First international conference on Principles of Security and Trust
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Verification of trace equivalence is difficult to automate in general because it requires relating two infinite sets of traces. The problem becomes even more complex when algebraic properties of cryptographic primitives are taken in account in the formal model. For example, no verification tool or technique can currently handle automatically a realistic model of re-encryption or associative-commutative operators. In this setting, we propose a general technique for reducing the set of traces that have to be analyzed to a set of local traces. A local trace restricts the way in which some function symbols are used, and this allows us to perform a second reduction, by showing that some algebraic properties can be safely ignored in local traces. In particular, local traces for re-encryption will contain only a bounded number of re-encryptions for any given ciphertext, leading to a sound elimination of equations that model re-encryption. For associativity and commutativity, local traces will determine a canonical use of the associative-commutative operator, where reasoning modulo AC is no stronger than reasoning without AC. We illustrate these results by considering a non-disjoint combination of equational theories for the verification of vote privacy in Prêt à Voter. ProVerif can not handle the input theory as it is, but it does terminate with success on the theory obtained using our reduction result.