Abstract
Encryption ‘distributing over pairs’ is a technique employed in several cryptographic protocols. We show that unification is decidable for an equational theory HE specifying such an encryption. The method consists in transforming any given problem in such a way, that the resulting problem can be solved by combining a graph-based reasoning on its equations involving the homomorphisms, with a syntactic reasoning on its pairings. We show HE-unification to be NP-hard and in EXPTIME. We also indicate, briefly, how to extend HE-unification to Cap unification modulo HE, that can be used as a tool for modeling and analyzing cryptographic protocols where encryption follows the ECB mode, i.e., is done block-wise on messages.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with Caps. In: Proc. of the Int. Conference RTA’07. LNCS, vol. 4533, pp. 20–35. Springer-Verlag (2007)
Anantharaman, S., Lin, H., Lynch, C., Narendran, P., Rusinowitch, M.: Unification modulo homomorphic encryption. In: Proc. of Int. Conf. FROCOS 2009, TRENTO-Italy. LNAI, vol. 5749, pp. 100–116. Springer-Verlag (2009)
Anantharaman, S., Lin, H., Lynch, C., Narendran, P., Rusinowitch, M.: Cap Unification: application to protocol security modulo homomorphic encryption. In: Proc. of the 5th ACM Symp. on Information, Computer and Communications Security, ASIACCS’10, pp. 192–203. ACM, New York (2010)
Baader, F., Nipkow, T.: Term Rewriting and All That. Cambridge University Press, New York (1998)
Baudet, M.: Deciding security of protocols against off-line guessing attacks. In: Proc. of the 12th ACM Conf. on Computer and Comm. Security, CCS’05, pp. 16–25. ACM, New York (2005)
Comon-Lundh, H., Treinen, R.: Easy intruder deductions. Verification: theory and practice In: LNCS 2772, pp. 225–242. Springer-Verlag (2004)
Comon-Lundh, H., Shmatikov, V.: Intruder deductions, constraint solving and insecurity decision in presence of exclusive-or. In: Proc. of the Logic in Computer Science Conference, LICS’03, pp. 271–280. IEEE Computer Society Press (2003)
Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. J. Comput. Secur. 14(1), 1–43 (2006)
Cortier, V., Rusinowitch, M., Zalinescu, E.: A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. In: Proc. of the 7th ACM SIGPLAN Conf., PPDP’05, pp. 12–22 (2005)
Delaune, S., Jacquemard, F.: A decision procedure for the verification of security protocols with explicit destructors. In: Proc. of the 11th ACM Conference on Computer and Communications Security (CCS’04), pp. 278–287. ACM, Washington (2004)
Kremer, S., Ryan, M.D.: Analysing the vulnerability of protocols to produce known-pair and chosen-text attacks. In: Proc. of the 2nd Int. Workshop on Security Issues in Coordination Models, Languages, and Systems (SecCo 2004), ENTCS, vol. 128, Issue 5, pp. 87–104 (2004)
Lafourcade, P.: Relation between unification problem and intruder deduction problem. In: Proc. of the 3rd Int. Workshop on Security and Rewriting Techniques (SecReT’08). Pittsburgh, USA (2008)
Lafourcade, P., Lugiez, D., Treinen, R.: Intruder deduction for the equational theory of Abelian groups with distributive encryption. Inf. Comput. 205(4), 581–623 (2007)
Millen, J., Shmatikov, V.: Constraint solving for bounded-process cryptographic protocol analysis. In: Proc. of the 8th ACM Conference on Computer and Communications Security, pp. 166–175. ACM, New York (2001)
Narendran, P., Marshall, A., Mahapatra, B.: On the Complexity of the Tiden-Arnborg Algorithm for Unification modulo One-Sided Distributivity. Int. Workshop on Unification UNIF’2010, Edinburgh (2010)
Narendran, P., Pfenning, F., Statman, R.: On the unification problem for cartesian closed categories. In: Proc. of the Logic in Computer Science Conference LICS’93, pp. 57–63 (1993)
Schaefer, T.J.: The complexity of satisfiability problems. In: Proc. of the 10th Annual ACM Symposium on Theory of Computing, pp. 216–226 (1978)
Tiden, E., Arnborg, S.: Unification problems with one-sided distributivity. J. Symb. Comput. 3(1–2), 183–202 (1987)
Author information
Authors and Affiliations
Corresponding author
Additional information
Work supported by NSF Grants CNS-0831305 and CNS-0831209, and partially supported by the FP7-ICT-2007-1 Project no. 216471, AVANTSSAR.
Rights and permissions
About this article
Cite this article
Anantharaman, S., Lin, H., Lynch, C. et al. Unification Modulo Homomorphic Encryption. J Autom Reasoning 48, 135–158 (2012). https://doi.org/10.1007/s10817-010-9205-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10817-010-9205-y