1995
DOI: 10.1007/bfb0053447
|View full text |Cite
|
Sign up to set email alerts
|

Formal requirements for key distribution protocols

Abstract: Abstract. We discuss generic formal requirements for reasoning about two party key distribution protocols, using a language developed for specifying security requirements for security protocols. Typically earlier work has considered formal analysis of already developed protocols. Our goal is to present sets of formal requirements for various contexts which can be applied at the design stage as well as to existing protocols. We use a protocol analysis tool we have developed to determine whether or not a specifi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2001
2001
2015
2015

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Syverson and Meadows [14] presented the formal requirements for authentication in key distribution protocols. They tried to provide a single set of requirements to specify a whole class of protocols, which can be fine-tuned for the particular application.…”
Section: Related Workmentioning
confidence: 99%
“…Syverson and Meadows [14] presented the formal requirements for authentication in key distribution protocols. They tried to provide a single set of requirements to specify a whole class of protocols, which can be fine-tuned for the particular application.…”
Section: Related Workmentioning
confidence: 99%
“…These include key distribution and key agreement protocols [30,31], complex electronic commerce protocols such as SET [22], and, most recently, group key distribution protocols [23].…”
Section: Safety Requirements For Cryptographic Protocolsmentioning
confidence: 99%
“…Among these, generic requirements have been given for two-party key distribution protocols [14,15] and two-party key agreement protocols [16]. The most ambitious specification undertaken using NPATRL has involved the requirements of the credit card payment transaction protocol SET (Secure Electronic Transactions) [9].…”
Section: The Npatrl Syntaxmentioning
confidence: 99%