Sciweavers

ESORICS
2007
Springer

Completeness of the Authentication Tests

14 years 6 months ago
Completeness of the Authentication Tests
Protocol participants manipulate values, transforming the cryptographic contexts in which they occur. The rules of the protocol determine which transformations are permitted. We formalize these transformations, obtaining new versions of the two authentication tests from earlier strand space papers. We prove that the new versions are complete, in this sense: any collection of behaviors that satisfies those two authentication tests, when combined with some feasible adversary behavior, yields a possible execution. We illustrate the strengthened authentication tests with brief analyses of three protocols.
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th
Added 07 Jun 2010
Updated 07 Jun 2010
Type Conference
Year 2007
Where ESORICS
Authors Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
Comments (0)