{"id":"https://openalex.org/W3002697938","doi":"https://doi.org/10.3233/jcs-191366","title":"On the semantics of communications when verifying equivalence properties","display_name":"On the semantics of communications when verifying equivalence properties","publication_year":2020,"publication_date":"2020-01-29","ids":{"openalex":"https://openalex.org/W3002697938","doi":"https://doi.org/10.3233/jcs-191366","mag":"3002697938"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-191366","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-191366","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs191366?id=journal-of-computer-security%2Fjcs191366","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs191366?id=journal-of-computer-security%2Fjcs191366","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079345097","display_name":"Kushal Babel","orcid":"https://orcid.org/0000-0002-6776-5273"},"institutions":[{"id":"https://openalex.org/I205783295","display_name":"Cornell University","ror":"https://ror.org/05bnh6r87","country_code":"US","type":"education","lineage":["https://openalex.org/I205783295"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kushal Babel","raw_affiliation_strings":["Cornell University, US. E-mail:\u00a0","Cornell University [New York] ( Ithaca, New York 14853 - United States)"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cornell University, US. E-mail:\u00a0","institution_ids":["https://openalex.org/I205783295"]},{"raw_affiliation_string":"Cornell University [New York] ( Ithaca, New York 14853 - United States)","institution_ids":["https://openalex.org/I205783295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065695523","display_name":"Vincent Cheval","orcid":"https://orcid.org/0000-0002-3622-2129"},"institutions":[{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]},{"id":"https://openalex.org/I4210127166","display_name":"Centre Inria de l'Universit\u00e9 de Lorraine","ror":"https://ror.org/03fcjvn64","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210127166"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Vincent Cheval","raw_affiliation_strings":["Inria Nancy Grand-Est, Loria, France. E-mails:\u00a0,\u00a0","Inria Nancy Grand-Est, Loria, France. E-mails:\u00a0vincent.cheval@inria.fr,\u00a0steve.kremer@inria.fr"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Inria Nancy Grand-Est, Loria, France. E-mails:\u00a0,\u00a0","institution_ids":["https://openalex.org/I4210127166","https://openalex.org/I4210121838"]},{"raw_affiliation_string":"Inria Nancy Grand-Est, Loria, France. E-mails:\u00a0vincent.cheval@inria.fr,\u00a0steve.kremer@inria.fr","institution_ids":["https://openalex.org/I4210121838"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085316790","display_name":"Steve Kremer","orcid":"https://orcid.org/0009-0004-6946-0678"},"institutions":[{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]},{"id":"https://openalex.org/I4210127166","display_name":"Centre Inria de l'Universit\u00e9 de Lorraine","ror":"https://ror.org/03fcjvn64","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210127166"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Steve Kremer","raw_affiliation_strings":["Inria Nancy Grand-Est, Loria, France. E-mails:\u00a0,\u00a0","Inria Nancy Grand-Est, Loria, France. E-mails:\u00a0vincent.cheval@inria.fr,\u00a0steve.kremer@inria.fr"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Inria Nancy Grand-Est, Loria, France. E-mails:\u00a0,\u00a0","institution_ids":["https://openalex.org/I4210127166","https://openalex.org/I4210121838"]},{"raw_affiliation_string":"Inria Nancy Grand-Est, Loria, France. E-mails:\u00a0vincent.cheval@inria.fr,\u00a0steve.kremer@inria.fr","institution_ids":["https://openalex.org/I4210121838"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5065695523"],"corresponding_institution_ids":["https://openalex.org/I4210121838","https://openalex.org/I4210127166"],"apc_list":null,"apc_paid":null,"fwci":0.9716,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.77077012,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"28","issue":"1","first_page":"71","last_page":"127"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7262424230575562},{"id":"https://openalex.org/keywords/equivalence","display_name":"Equivalence (formal languages)","score":0.6061521768569946},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5949702858924866},{"id":"https://openalex.org/keywords/operational-semantics","display_name":"Operational semantics","score":0.5731714963912964},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5562898516654968},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.5081071853637695},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.48075243830680847},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.47811809182167053},{"id":"https://openalex.org/keywords/formal-semantics","display_name":"Formal semantics (linguistics)","score":0.4479691684246063},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.42498287558555603},{"id":"https://openalex.org/keywords/reachability","display_name":"Reachability","score":0.4129277467727661},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4117778539657593},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2792012393474579},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26075953245162964},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.19078126549720764},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1766381561756134}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7262424230575562},{"id":"https://openalex.org/C2780069185","wikidata":"https://www.wikidata.org/wiki/Q7977945","display_name":"Equivalence (formal languages)","level":2,"score":0.6061521768569946},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5949702858924866},{"id":"https://openalex.org/C156325763","wikidata":"https://www.wikidata.org/wiki/Q1930895","display_name":"Operational semantics","level":3,"score":0.5731714963912964},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5562898516654968},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.5081071853637695},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.48075243830680847},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.47811809182167053},{"id":"https://openalex.org/C146499914","wikidata":"https://www.wikidata.org/wiki/Q5469969","display_name":"Formal semantics (linguistics)","level":2,"score":0.4479691684246063},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.42498287558555603},{"id":"https://openalex.org/C136643341","wikidata":"https://www.wikidata.org/wiki/Q1361526","display_name":"Reachability","level":2,"score":0.4129277467727661},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4117778539657593},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2792012393474579},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26075953245162964},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.19078126549720764},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1766381561756134},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3233/jcs-191366","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-191366","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs191366?id=journal-of-computer-security%2Fjcs191366","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-02446910v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-02446910","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Computer Security, 2020, 28 (1), pp.71-127. &#x27E8;10.3233/JCS-191366&#x27E9;","raw_type":"Journal articles"}],"best_oa_location":{"id":"doi:10.3233/jcs-191366","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-191366","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs191366?id=journal-of-computer-security%2Fjcs191366","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4699999988079071}],"awards":[{"id":"https://openalex.org/G2300704736","display_name":"Protocol Analysis - Combining Existing Tools","funder_award_id":"ANR-17-CE39-0004","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"},{"id":"https://openalex.org/G3388325167","display_name":null,"funder_award_id":"ANR-17-CE39-0004-01","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"},{"id":"https://openalex.org/G3621569411","display_name":"Automated Security Proofs of Cryptographic Protocols: Privacy, Untrusted Platforms and Applications to E-voting Protocols","funder_award_id":"645865","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G425068767","display_name":null,"funder_award_id":"TECAP ANR-17-CE39-0004-01","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"},{"id":"https://openalex.org/G6803667113","display_name":null,"funder_award_id":"ANR-17","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"},{"id":"https://openalex.org/G6860377923","display_name":null,"funder_award_id":"ANR-14-CE28-0030","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320320883","display_name":"Agence Nationale de la Recherche","ror":"https://ror.org/00rbzpz17"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3002697938.pdf","grobid_xml":"https://content.openalex.org/works/W3002697938.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W40134741","https://openalex.org/W146244851","https://openalex.org/W1479677827","https://openalex.org/W1562901937","https://openalex.org/W1571378841","https://openalex.org/W1603878273","https://openalex.org/W1623229847","https://openalex.org/W1973054120","https://openalex.org/W2001874371","https://openalex.org/W2005880313","https://openalex.org/W2042609207","https://openalex.org/W2045673642","https://openalex.org/W2055259417","https://openalex.org/W2104655005","https://openalex.org/W2106069663","https://openalex.org/W2117064875","https://openalex.org/W2126338744","https://openalex.org/W2133126578","https://openalex.org/W2161706819","https://openalex.org/W2167816957","https://openalex.org/W2521663436","https://openalex.org/W2728389594","https://openalex.org/W2766896269","https://openalex.org/W2787222284","https://openalex.org/W2914971001","https://openalex.org/W2963407533","https://openalex.org/W3125808851","https://openalex.org/W3142572285","https://openalex.org/W3150095246","https://openalex.org/W3162919972","https://openalex.org/W3186322244"],"related_works":["https://openalex.org/W2884574904","https://openalex.org/W2385508105","https://openalex.org/W2073736684","https://openalex.org/W2013028647","https://openalex.org/W2124431509","https://openalex.org/W60938034","https://openalex.org/W1498867194","https://openalex.org/W2790733222","https://openalex.org/W3183513857","https://openalex.org/W1975908952"],"abstract_inverted_index":{"Symbolic":[0],"models":[1],"for":[2,132,136,185,198],"security":[3],"protocol":[4,69],"verification":[5,115,194],"were":[6,30],"pioneered":[7],"by":[8,20,167],"Dolev":[9],"and":[10,47,152,208],"Yao":[11],"in":[12,58,204],"their":[13,210],"seminal":[14],"work.":[15],"Since":[16],"then,":[17],"although":[18],"inspired":[19],"the":[21,27,39,45,64,75,86,89,95,101,114,120,168,187,201,205],"same":[22],"ideas,":[23],"many":[24],"variants":[25],"of":[26,183,195,200],"original":[28],"model":[29],"developed.":[31],"In":[32],"particular,":[33],"a":[34,154],"common":[35],"assumption":[36,54],"is":[37,71,98,123],"that":[38,141],"attacker":[40,87],"has":[41,55],"complete":[42],"control":[43],"over":[44],"network":[46],"can":[48],"therefore":[49],"intercept":[50],"any":[51,68,82],"message.":[52],"This":[53,103,170],"been":[56],"interpreted":[57],"slightly":[59],"different":[60],"ways":[61],"depending":[62,112],"on":[63,113,212],"particular":[65],"models:":[66],"either":[67,117],"output":[70],"directly":[72],"routed":[73],"to":[74,100,146],"adversary,":[76],"or":[77,119],"communications":[78,159],"may":[79,105],"be":[80],"among":[81],"two":[83,143,181],"participants,":[84],"including":[85],"\u2013":[88],"scheduling":[90],"between":[91],"which":[92,186],"exact":[93],"parties":[94],"communication":[96],"happens":[97],"left":[99],"attacker.":[102,169],"difference":[104],"seem":[106],"unimportant":[107],"at":[108],"first":[109],"glance":[110],"and,":[111],"tools,":[116],"one":[118],"other":[121],"semantics":[122,172,189,203],"implemented.":[124],"We":[125,149],"show":[126],"that,":[127],"unsurprisingly,":[128],"they":[129],"indeed":[130],"coincide":[131],"reachability":[133],"properties.":[134],"However,":[135],"indistinguishability":[137],"properties,":[138],"we":[139,179,192],"prove":[140],"these":[142],"interpretations":[144],"lead":[145],"incomparable":[147],"semantics.":[148],"also":[150],"introduce":[151],"study":[153],"new":[155,171],"semantics,":[156],"where":[157],"internal":[158],"are":[160,164],"allowed":[161],"but":[162],"messages":[163],"always":[165],"eavesdropped":[166],"yields":[173],"strictly":[174],"stronger":[175],"equivalence":[176,197],"relations.":[177],"Moreover,":[178],"identify":[180],"subclasses":[182],"protocols":[184],"three":[188,202],"coincide.":[190],"Finally,":[191],"implemented":[193],"trace":[196],"each":[199],"DeepSec":[206],"tool":[207],"compare":[209],"performances":[211],"several":[213],"classical":[214],"examples.":[215]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2026-05-04T08:30:34.212998","created_date":"2025-10-10T00:00:00"}
