30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

equational theory, i.e. we reason modulo an equational theory on atoms<br />

<strong>and</strong> terms.<br />

199<br />

3. extend the application on cryptographic protocols from search <strong>of</strong> pro<strong>of</strong>s<br />

to pro<strong>of</strong> <strong>of</strong> correctness, <strong>and</strong> that by including the clauses describing the<br />

protocol to the set <strong>of</strong> clauses.<br />

4. extend the application on cryptographic protocols to the unperfect cryptography<br />

hypothesis, <strong>and</strong> that by including the clauses describing the algebraic<br />

properties <strong>of</strong> primitives <strong>and</strong> the clauses representing the congruence<br />

relation to the set <strong>of</strong> clauses.<br />

In Chapter 7, we studied a new class <strong>of</strong> cryptographic protocols: the<br />

electronic-voting protocols, <strong>and</strong> in particular the voter verifiability property, which<br />

includes the individual verifiability <strong>and</strong> the universal verifiability properties. We<br />

formally defined these two properties using the applied pi calculus, <strong>and</strong> we applied<br />

our definition to the e-voting protocol due to Fujioka, Okamoto & Ohta [115]<br />

<strong>and</strong> the e-voting protocol due to Lee et al. [141]. In future works, we plan to:<br />

1. extend the scope <strong>of</strong> e-voting protocols on which we apply our definition in<br />

order to capture more relevant protocols such as the protocol due to Okamoto<br />

[165], <strong>and</strong> the protocol due to D. S<strong>and</strong>ler et al. [182].<br />

2. extend the decidability results obtained on the saturated systems in order<br />

to prove the voter verifiability property.<br />

3. analyse the e-voting protocols by taking into consideration algebraic properties<br />

<strong>of</strong> cryptographic primitives.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!