Type-based automated verification of authenticity in asymmetric cryptographic protocols

2Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without any type annotations or explicit type casts. We have implemented a protocol verifier SpiCA2 based on the algorithm, and confirmed its effectiveness. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Dahl, M., Kobayashi, N., Sun, Y., & Hüttel, H. (2011). Type-based automated verification of authenticity in asymmetric cryptographic protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6996 LNCS, pp. 75–89). Springer Verlag. https://doi.org/10.1007/978-3-642-24372-1_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free