2012
DOI: 10.4236/ijcns.2012.53021
|View full text |Cite
|
Sign up to set email alerts
|

Formal Verification of Secrecy in Group Key Protocols Using Event-B

Abstract: Group key security protocols play an important role in today's communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distribution protocols. Security properties that are well defined in normal two-party protocols have different meanings and different interpretations in group key distribution protocols, specifically, secrecy properties, such as group secrecy, forward secrecy, backward secrecy, and key independence. In t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…Formal methods have been used in order to develop systems from parts of Amazon Web Services (Newcombe et al, 2015) to assurance of the software powering safety-critical aspects of a line of the Paris Metro system (Behm et al, 1999). We pay particular attention to a development of the B-method, known as Event-B (Abrial, 2010), which has been leveraged for both security analysis (Gawanmeh et al, 2012) as well as safety analysis (Rezazadeh et al, 2007) and has therefore proven itself useful in both domains. Furthermore, Event-B has been paired with an STPA methodology in the past which has demonstrated synergies between STPA's constraint-based approach and Event-B's modelling techniques (Colley and Butler, 2013).…”
Section: Background and Related Workmentioning
confidence: 99%
“…Formal methods have been used in order to develop systems from parts of Amazon Web Services (Newcombe et al, 2015) to assurance of the software powering safety-critical aspects of a line of the Paris Metro system (Behm et al, 1999). We pay particular attention to a development of the B-method, known as Event-B (Abrial, 2010), which has been leveraged for both security analysis (Gawanmeh et al, 2012) as well as safety analysis (Rezazadeh et al, 2007) and has therefore proven itself useful in both domains. Furthermore, Event-B has been paired with an STPA methodology in the past which has demonstrated synergies between STPA's constraint-based approach and Event-B's modelling techniques (Colley and Butler, 2013).…”
Section: Background and Related Workmentioning
confidence: 99%