作者: Hubert Comon-Lundh , Véronique Cortier
DOI: 10.1016/J.SCICO.2003.12.002
关键词: Bounded function 、 Challenge–response authentication 、 Security properties 、 Computer science 、 Cryptographic primitive 、 Secrecy 、 Authentication 、 Authentication protocol 、 Cryptographic protocol 、 Computer security
摘要: We consider arbitrary cryptographic protocols and security properties. show that it is always sufficient to a bounded number of agents b (actually = 2 in most the cases): if there an attack involving n agents, then at agents.