18th IEEE Computer Security Foundations Workshop (CSFW'05)
DOI: 10.1109/csfw.2005.7
|View full text |Cite
|
Sign up to set email alerts
|

An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
46
0

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 34 publications
(46 citation statements)
references
References 15 publications
0
46
0
Order By: Relevance
“…The main difference between our runs and bundles is that in the present framework, the variables can be used to follow the execution of the run, and track the data as it flows through it. 3 Execution The above definition falls short of capturing the intuitive notion of a run as a snapshot of the execution of a protocol. Indeed, while our runs correctly map receives to sends, they do not ensure that variables are properly handled.…”
Section: Execution Modelmentioning
confidence: 99%
“…The main difference between our runs and bundles is that in the present framework, the variables can be used to follow the execution of the run, and track the data as it flows through it. 3 Execution The above definition falls short of capturing the intuitive notion of a run as a snapshot of the execution of a protocol. Indeed, while our runs correctly map receives to sends, they do not ensure that variables are properly handled.…”
Section: Execution Modelmentioning
confidence: 99%
“…In the symbolic model, protocol execution and the possible actions of an attacker are characterized using a symbolic model of computation that allows nondeterminism but does not incorporate probability or computational complexity bounds. In addition to many model checking and bug-finding efforts, there have been some significant correctness proofs carried using the symbolic model, including mechanically checked formal proofs [13,14], unformalized but mathematical proofs about a multiset rewriting model [15][16][17], and work using compositional formal logic approaches [18][19][20][21][22]. Several groups of researchers have taken steps to connect the symbolic model to the probabilistic polynomial-time computational model used in cryptographic studies, e.g., [23-29, 3, 4, 30].…”
Section: Introductionmentioning
confidence: 99%
“…Originally, it included signatures as well, but for simplicity, we leave that out from this analysis. BPL was defined to give a simple formulation of a core part of the protocol logics (PCL) of [16,12,11] for proving some aimed properties in the sense of [25,22] within the framework of first order logic; all notions and assumptions are strictly formulated by the first order logical language explicitly. Contrary to PCL, in BPL there are no explicit encrypt, decrypt, match actions, only nonce generation, send and receive.…”
Section: Introductionmentioning
confidence: 99%