Update Semantics of Security Protocols

被引:0
|
作者
Arjen Hommersom
John-jules Meyer
Erik De vink
机构
[1] University of Nijmegen,Nijmegen Institute for Computing and Information Sciences
[2] University of Utrecht,Institute of Information and Computing Sciences
[3] Technische Universiteit Eindhoven,Department of Mathematics and Computer Science, Leiden Institute of Advanced Computer Science
[4] Leiden University,undefined
来源
Synthese | 2004年 / 142卷
关键词
Epistemic State; Security Protocol; Kripke Model; Epistemic Logic; Recent Insight;
D O I
暂无
中图分类号
学科分类号
摘要
We present a model-theoretic approach for reasoning about security protocols, applying recent insights from dynamic epistemic logics. This enables us to describe exactly the subsequent epistemic states of the agents participating in the protocol, using Kripke models and transitions between these based on updates of the agents’ beliefs associated with steps in the protocol. As a case study we will consider the SRA Three Pass protocol and discuss the Wide-Mouthed Frog protocol.
引用
收藏
页码:229 / 267
页数:38
相关论文
共 50 条
  • [21] An update semantics for deontic reasoning
    van der Torre, LWN
    Tan, YH
    NORMS, LOGICS AND INFORMATION SYSTEMS: NEW STUDIES IN DEONTIC LOGIC AND COMPUTER SCIENCE, 1999, 49 : 73 - 90
  • [22] From security protocols to systems security
    Monahan, B
    SECURITY PROTOCOLS, 2005, 3364 : 307 - 323
  • [23] IP security protocols
    Bozoki, E
    DR DOBBS JOURNAL, 1999, 24 (12): : 42 - +
  • [24] Verification of Security Protocols
    Cortier, Veronique
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2009, 5403 : 5 - 13
  • [25] Analysis of security protocols
    Durgin, NA
    Mitchell, JC
    CALCULATIONAL SYSTEM DESIGN, 1999, 173 : 369 - 394
  • [26] Analysing security protocols
    Gollmann, D
    FORMAL ASPECTS OF SECURITY, 2003, 2629 : 71 - 80
  • [27] Incentives in Security Protocols
    Azouvi, Sarah
    Hicks, Alexander
    Murdoch, Steven J.
    SECURITY PROTOCOLS XXVI, 2018, 11286 : 132 - 141
  • [28] Internet security protocols
    Fumy, W
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 186 - 208
  • [29] Security protocols and their properties
    Abadi, M
    FOUNDATIONS OF SECURE COMPUTATION, 2000, 175 : 39 - 60
  • [30] Multichannel security protocols
    Wong, Ford Long
    Stajano, Rank
    IEEE PERVASIVE COMPUTING, 2007, 6 (04) : 31 - 39