Hiding names: Private authentication in the applied pi calculus

34Citations
Citations of this article
32Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present the analysis of a protocol for private authentication in the applied pi calculus. We treat authenticity and secrecy properties of the protocol. Although such properties are fairly standard, their formulation in the applied pi calculus makes an original use of process equivalences. In addition, we treat identity-protection properties, which are a delicate concern in several recent protocol designs. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Fournet, C., & Abadi, M. (2003). Hiding names: Private authentication in the applied pi calculus. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2609, 317–338. https://doi.org/10.1007/3-540-36532-x_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free