Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani
We present an NP decision procedure for the formal analysis of protocols in presence of modular exponentiation with products allowed in exponents. The number of factors that may appear in the products is unlimited. We illustrate that our model is powerful enough to uncover known attacks on the A-GDH.2 protocol suite.