Model checking analysis of needham-schroeder public-key protocol

被引:0
|
作者
Zhang, Yu-Qing [1 ,2 ]
Wang, Lei [2 ]
Xiao, Guo-Zhen [2 ]
Wu, Jian-Ping [1 ]
机构
[1] Network Res. Center, Tsinghua Univ., Beijing 100084, China
[2] Info. Security Inst., Xidian Univ., Xi'an 710071, China
来源
Ruan Jian Xue Bao/Journal of Software | 2000年 / 11卷 / 10期
关键词
BAN logic - Cipher algorithms - Cryptographic protocols - Model checking - NS public key protocols - Symbolic model verifier;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1348 / 1352
相关论文
共 50 条
  • [41] A Scenario-Based Protocol Checker for Public-Key Authentication Scheme
    Saito, Takamichi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (06): : 1268 - 1279
  • [42] A new notion of soundness in bare public-key model
    Zhao, YL
    Zhu, H
    PROGRESS IN NATURAL SCIENCE-MATERIALS INTERNATIONAL, 2003, 13 (12) : 927 - 931
  • [43] Public-Key Encryption in the Bounded-Retrieval Model
    Alwen, Joel
    Dodis, Yevgeniy
    Naor, Moni
    Segev, Gil
    Walfish, Shabsi
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 113 - +
  • [44] A CRITICAL ANALYSIS OF THE SECURITY OF KNAPSACK PUBLIC-KEY ALGORITHMS
    DESMEDT, YG
    VANDEWALLE, JP
    GOVAERTS, RJM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1984, 30 (04) : 601 - 611
  • [45] Performance Analysis of Various Asymmetric Public-Key Cryptosystem
    Desai, Amogh
    Parekh, Virang
    Unadkat, Utsav
    Shekokar, Narendra
    PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2022, 2023, 475 : 437 - 449
  • [46] Quantum Random Oracle Model for Quantum Public-Key Encryption
    Shang, Tao
    Chen, Ranyiliu
    Lei, Qi
    IEEE ACCESS, 2019, 7 (130024-130031) : 130024 - 130031
  • [47] Resettable zero-knowledge in the weak public-key model
    Zhao, YL
    Deng, XT
    Lee, CH
    Zhu, H
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 123 - 139
  • [48] Public-Key Infrastructure for the secure Border Gateway Protocol (S-BGP)
    Seo, K
    Lynn, C
    Kent, S
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 239 - 253
  • [49] Implementation of Public-Key Infrastructure for Smart Parking System Using MQTT Protocol
    Vijayan, Rajilal Manathala
    Ezhilarasie, R.
    Umamakeswari, A.
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 1029 - 1037
  • [50] Certificateless public-key signature: Security model and efficient construction
    Zhang, Zhenfeng
    Wong, Duncan S.
    Xu, Jing
    Feng, Dengguo
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2006, 3989 : 293 - 308