The coinductive approach to verifying cryptographic protocols

2Citations
Citations of this article
65Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We look at a new way of specifying and verifying cryptographic protocols using the Coalgebraic Class Specification Language. Protocols are specified into CCSL (with temporal operators for "free") and translated by the CCSL compiler into theories for the theorem prover PVS. Within PVS, the desired security conditions can then be (dis)proved. In addition, we are interested in using assumptions which are reflected in real-life networks. However, as a result, we present only a partial solution here. We have not proved full correctness of a protocol under such loose restrictions. This prompts discussion of what assumptions are acceptable in protocol verification, and when practical concerns may outweigh theoretical motivations. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Hughes, J., & Warnier, M. (2003). The coinductive approach to verifying cryptographic protocols. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2755, 268–283. https://doi.org/10.1007/978-3-540-40020-2_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free