Verification of authentication protocols based on the binding relation

3Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The correctness of an authentication protocol is based on, among others, the relation between nonces and data that is established in the course of execution of the protocol. In this paper, we formulate an inference system that derives the secrecy of nonces and the relation that binds nonces and data. It is easy to show the correctness of a protocol by directly deriving the binding relation using the inference rules. Depending on situations, it is also possible to extend the inference system by simply adding new inference rules. We give some example protocols whose correctness can only be shown using some conditions on nonces that are formulated as additional inference rules. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Hagiya, M., Takemura, R., Takahashi, K., & Saito, T. (2003). Verification of authentication protocols based on the binding relation. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2609, 299–316. https://doi.org/10.1007/3-540-36532-x_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free