We present the analysis of a protocol for private authentication in the applied pi calculus. We treat authenticity and secrecy properties of the protocol. Although such properties are fairly standard, their formulation in the applied pi calculus makes an original use of process equivalences. In addition, we treat identity-protection properties, which are a delicate concern in several recent protocol designs. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Fournet, C., & Abadi, M. (2003). Hiding names: Private authentication in the applied pi calculus. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2609, 317–338. https://doi.org/10.1007/3-540-36532-x_20
Mendeley helps you to discover research relevant for your work.