Skip to Main content Skip to Navigation
New interface
Theses

Verification and composition of security protocols with applications to electronic voting

Abstract : This thesis is about the formal verification and composition of security protocols, motivated by applications to electronic voting protocols. Chapters 3 to 5 concern the verification of security protocols while Chapter 6 concerns composition.We show in Chapter 3 how to reduce certain problems from a quotient term algebra to the free term algebra via the use of strongly complete sets of variants. We show that, when the quotient algebra is given by a convergent optimally reducing rewrite system, finite strongly complete sets of variants exist and are effectively computable.In Chapter 4, we show that static equivalence for (classes of) equational theories including subterm convergent equational theories, trapdoor commitment and blind signatures is decidable in polynomial time. We also provide an efficient implementation.In Chapter 5 we extend the previous decision procedure to handle trace equivalence. We use finite strongly complete sets of variants introduced in Chapter 3 to get rid of the equational theory and we model each protocol trace as a Horn theory which we solve using a refinement of resolution. Although we have not been able to prove that this procedure always terminates, we have implemented it and used it to provide the first automated proof of vote privacy of the FOO electronic voting protocol.In Chapter 6, we study composition of protocols. We show that two protocols that use arbitrary disjoint cryptographic primitives compose securely if they do not reveal or reuse any shared secret. We also show that a form of tagging is sufficient to provide disjointness in the case of a fixed set of cryptographic primitives.
Document type :
Theses
Complete list of metadata

Cited literature [137 references]  Display  Hide  Download

https://tel.archives-ouvertes.fr/tel-00661721
Contributor : ABES STAR :  Contact
Submitted on : Friday, January 20, 2012 - 2:43:08 PM
Last modification on : Monday, February 15, 2021 - 10:49:30 AM
Long-term archiving on: : Saturday, April 21, 2012 - 2:35:34 AM

File

Ciobaca2011.pdf
Version validated by the jury (STAR)

Identifiers

  • HAL Id : tel-00661721, version 1

Collections

Citation

Ştefan Ciobâcǎ Ciobâcǎ. Verification and composition of security protocols with applications to electronic voting. Other [cs.OH]. École normale supérieure de Cachan - ENS Cachan, 2011. English. ⟨NNT : 2011DENS0059⟩. ⟨tel-00661721⟩

Share

Metrics

Record views

434

Files downloads

274