Proof of soundness (integrity) of cryptographic protocols

作者: G. J. Simmons

DOI: 10.1007/BF00197941

关键词:

摘要: In 1990 a workshop on the Mathematical Concepts (or Principles) of Dependable Systems was held at Mathematisches Forschungsinstitut Oberwolfach in Germany. The purpose to examine mathematical techniques developed make it possible prove proper functioning complex systems--where system could be either hardware, software, information protocols, etc., or combinations these components. Principal researchers each areas were invited take part workshop, and did--but as is so often case scientific meetings, one area emerged clear center gravity for workshop. This topic applying formal methods proof soundness correctness cryptographic protocols. organizers felt that results reported this important cryptology community they deserved publication whole, opposed separate isolated papers: hence special section. paper, which essentially an introduction paper follows, describes background challenge problem(s) provided unifying theme three systems analysis treated it.

参考文章(9)
Catherine A. Meadows, A System for the Specification and Verification of Key Management Protocols. ieee symposium on security and privacy. pp. 182- 197 ,(1991)
Makoto Tatebayashi, Natsume Matsuzaki, David B. Newman, Key Distribution Protocol for Digital Mobile Communication Systems international cryptology conference. pp. 324- 334 ,(1989) , 10.1007/0-387-34805-0_30
Catherine Meadows, Applying Formal Methods to the Analysis of a Key Management Protocol Journal of Computer Security. ,vol. 1, pp. 5- 35 ,(1992) , 10.3233/JCS-1992-1102
J. H. Loxton, David S. P. Khoo, Gregory J. Bird, Jennifer Seberry, A cubic RSA code equivalent to factorization Journal of Cryptology. ,vol. 5, pp. 139- 150 ,(1992) , 10.1007/BF00193566
Gustavus J. Simmons, How to (Selectively) Broadcast A Secret ieee symposium on security and privacy. pp. 108- 108 ,(1985) , 10.1109/SP.1985.10006
J.H. Moore, Protocol failures in cryptosystems Proceedings of the IEEE. ,vol. 76, pp. 594- 602 ,(1988) , 10.1109/5.4444
George B. Purdy, Gustavus J. Simmons, James A. Studier, A Software Protection Scheme ieee symposium on security and privacy. pp. 99- 99 ,(1982) , 10.1109/SP.1982.10012
H. C. Williams, An M3 Public-Key Encryption Scheme theory and application of cryptographic techniques. pp. 358- 368 ,(1985) , 10.1007/3-540-39799-X_26
H C Williams, An M 3 public-key encryption scheme international cryptology conference. pp. 358- 368 ,(1986)