Secrecy types for asymmetric communication

7Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We develop a typed process calculus for security protocols in which types convey secrecy properties. We focus on asymmetric communication primitives, especially on public-key encryption. These present special dificulties, partly because they rely on related capabilities (e.g., “public” and “private” keys) with different levels of secrecy and scopes.

Cite

CITATION STYLE

APA

Abadi, M., & Blanchet, B. (2001). Secrecy types for asymmetric communication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2030, pp. 25–41). Springer Verlag. https://doi.org/10.1007/3-540-45315-6_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free