Computational semantics for basic protocol logic a stochastic approach

1Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper relates formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first order logic. Instead of the way Datta et al. defined computational semantics to their Protocol Composition Logic, we introduce a new, fully probabilistic method to assign computational semantics to the syntax. We present this via considering a simple example of such a formal model, the Basic Protocol Logic by K. Hasebe and M. Okada [7] , but the technique is suitable for extensions to more complex situations such as PCL. We make use of the usual mathematical treatment of stochastic processes, hence are able to treat arbitrary probability distributions, non-negligible probability of collision, causal dependence or independence. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Bana, G., Hasebe, K., & Okada, M. (2007). Computational semantics for basic protocol logic a stochastic approach. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4846 LNCS, pp. 86–94). Springer Verlag. https://doi.org/10.1007/978-3-540-76929-3_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free