Flat and one-variable clauses: Complexity of verifying cryptographic protocols with single blind copying

Helmut Seidl, Kumar Neeraj Verma

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

Cryptographic protocols with single blind copying were defined and modeled by Comon and Cortier using the new class C of first-order clauses. They showed its satisfiability problem to be in 3-DEXPTIME. We improve this result by showing that satisfiability for this class is NEXPTIME-complete, using new resolution techniques. We show satisfiability to be DEXPTIME-complete if clauses are Horn, which is what is required for modeling cryptographic protocols. While translation to Horn clauses only gives a DEXPTIME upper bound for the secrecy problem for these protocols, we further show that this secrecy problem is actually DEXPTIME-complete.

Original languageEnglish
Article number28
JournalACM Transactions on Computational Logic
Volume9
Issue number4
DOIs
StatePublished - 1 Aug 2008

Keywords

  • Cryptographic protocols
  • First-order logic
  • Horn clauses
  • Instantiation-based theorem proving
  • Resolution

Fingerprint

Dive into the research topics of 'Flat and one-variable clauses: Complexity of verifying cryptographic protocols with single blind copying'. Together they form a unique fingerprint.

Cite this