A Proof of Revised Yahalom Protocol

作者: Kim-Kwang Raymond Choo

DOI: 10.1007/978-0-387-87969-7_7

关键词:

摘要:

参考文章(16)
Michel Abdalla, Pierre-Alain Fouque, David Pointcheval, Password-Based Authenticated Key Exchange in the Three-Party Setting Public Key Cryptography - PKC 2005. ,vol. 3386, pp. 65- 84 ,(2005) , 10.1007/978-3-540-30580-4_6
Mihir Bellare, Phillip Rogaway, Entity authentication and key distribution international cryptology conference. pp. 232- 249 ,(1993) , 10.1007/3-540-48329-2_21
Michael Backes, Birgit Pfitzmann, On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol information security conference. pp. 233- 245 ,(2006) , 10.1007/0-387-33406-8_20
Lawrence C. Paulson, Relations between secrets: two formal analyses of the Yahalom protocol Journal of Computer Security. ,vol. 9, pp. 197- 216 ,(2001) , 10.3233/JCS-2001-9302
R. K. Bauer, T. A. Berson, R. J. Feiertag, A key distribution protocol using event markers ACM Transactions on Computer Systems. ,vol. 1, pp. 249- 255 ,(1983) , 10.1145/357369.357373
Michael Burrows, Martin Abadi, Roger Needham, A logic of authentication ACM Transactions on Computer Systems. ,vol. 8, pp. 18- 36 ,(1990) , 10.1145/77648.77649
D. Dolev, A. Yao, On the security of public key protocols IEEE Transactions on Information Theory. ,vol. 29, pp. 198- 208 ,(1983) , 10.1109/TIT.1983.1056650
Alan Bundy, Mateja Jamnik, Andrew Fugard, What is a proof Philosophical Transactions of the Royal Society A. ,vol. 363, pp. 2377- 2391 ,(2005) , 10.1098/RSTA.2005.1651
Li Gong, Lower bounds on messages and rounds for network authentication protocols computer and communications security. pp. 26- 37 ,(1993) , 10.1145/168588.168592
F. Javier Thayer Fábrega, Jonathan C. Herzog, Joshua D. Guttman, Strand spaces: proving security protocols correct Journal of Computer Security. ,vol. 7, pp. 191- 230 ,(1999) , 10.3233/JCS-1999-72-304