Protocol participants manipulate values, transforming the cryptographic contexts in which they occur. The rules of the protocol determine which transformations are permitted. We formalize these transformations, obtaining new versions of the two authentication tests from earlier strand space papers. We prove that the new versions are complete, in this sense: any collection of behaviors that satisfies those two authentication tests, when combined with some feasible adversary behavior, yields a possible execution. We illustrate the strengthened authentication tests with brief analyses of three protocols. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Doghmi, S. F., Guttman, J. D., & Thayer, F. J. (2007). Completeness of the authentication tests. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4734 LNCS, pp. 106–121). Springer Verlag. https://doi.org/10.1007/978-3-540-74835-9_8
Mendeley helps you to discover research relevant for your work.