Abstract | ||
---|---|---|
A mechanism is presented for reasoning about belief as a systematic way to understand the working of cryptographic protocols. The mechanism captures more features of such protocols than that given by M. Burrows et al. (1989) to which the proposals are a substantial extension. The notion of possession incorporated in the approach assumes that principles can include in messages data they do not believe in, but merely possess. This also enables conclusions such as `Q possesses the shared key', as in an example to be derived. The approach places a strong emphasis on the separation between the content and the meaning of messages. This can increase consistency in the analysis and, more importantly, introduce the ability to reason at more than one level. The final position in a given run will depend on the level of mutual trust of the specified principles participating in that run |
Year | DOI | Venue |
---|---|---|
1990 | 10.1109/RISP.1990.63854 | IEEE Symposium on Security and Privacy |
Keywords | Field | DocType |
belief reasoning,protocols,shared key,cryptography,cryptographic protocols,logic,graphics,cryptographic protocol,computational modeling,computer security,information analysis | Key management,Cryptography protocols,Cryptographic protocol,Computer science,Cryptography,Computer security,Theoretical computer science,Cryptographic primitive,Possession (law) | Conference |
Citations | PageRank | References |
309 | 46.28 | 6 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Li Gong | 1 | 309 | 46.28 |
Roger M. Needham | 2 | 4648 | 2075.99 |
Raphael Yahalom | 3 | 348 | 61.01 |