Flat and One-Variable Clauses: Complexity of Verifying Cryptographic Protocols with Single Blind Copying
Abstract
Cryptographic protocols with single blind copying were defined and modeled by Comon and Cortier using the new class $\mathcal C$ of first order clauses. They showed its satisfiability problem to be in 3-DEXPTIME. We improve this result by showing that satisfiability for this class is NEXPTIME-complete, using new resolution techniques. We show satisfiability to be DEXPTIME-complete if clauses are Horn, which is what is required for modeling cryptographic protocols. While translation to Horn clauses only gives a DEXPTIME upper bound for the secrecy problem for these protocols, we further show that this secrecy problem is actually DEXPTIME-complete.
- Publication:
-
arXiv e-prints
- Pub Date:
- November 2005
- DOI:
- 10.48550/arXiv.cs/0511014
- arXiv:
- arXiv:cs/0511014
- Bibcode:
- 2005cs.......11014S
- Keywords:
-
- Computer Science - Logic in Computer Science;
- Computer Science - Cryptography and Security
- E-Print:
- Long version of paper presented at LPAR 2004