Security properties: two agents are sufficient

  • Authors:
  • Hubert Comon-Lundh;Véronique Cortier

  • Affiliations:
  • Laboratoire Spécification et Vérification, CNRS, INRIA, Ecole Normale Supérieure de Cachan, Cachan, France;Laboratoire Spécification et Vérification, CNRS, INRIA, Ecole Normale Supérieure de Cachan, Cachan, France

  • Venue:
  • Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

We consider an important family of cryptographic protocols and a class of security properties which encompasses secrecy and authentication. We show that it is always sufficient to consider a bounded number of agents b (b = 2 for secrecy properties for example): if there is an attack involving n agents, then there is an attack involving at most b agents.