820
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      EVALUATION TECHNIQUE IN THE SPICALCULUS FOR CRYPTOGRAPHIC PROTOCOLS

      proceedings-article
      Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009) (ISIICT)
      Innovation and Information and Communication Technology (ISIICT 2009)
      15 - 17 December 2009
      Cryptographic protocols, testing equivalence, Bisimulation , authenticity and secrecy
      Bookmark

            Abstract

            Bisimulation as a technique could be well invested for proving authenticity and secrecy properties of cryptographic protocols to gain the legality of protocol optimization. In this paper, we will do some changes in the spi-calculus after the original work of M.Abadi and A.Gordan. Then we will introduce evade bisimulation following Abadi and Gordan’s framed bisimulation proposal, in which a convenient proof technique is presented. It will impose minimality requirements on the environment and detect the limit beyond which the bisimilarity is kept valid and furthermore it will avoid quantification over contexts. Also, it will give a solution for input transitions for the case of finite processes. Based on the revised spi-calculus would be used to prove that evade bisimilarity, an equivalence relation, is decidable for main security properties: Authenticity and Secrecy.

            Content

            Author and article information

            Contributors
            Conference
            December 2009
            December 2009
            : 98-112
            Affiliations
            [0001]Mobile Phone #: 00962-777357755
            Article
            10.14236/ewic/ISIICT2009.9
            75542a5d-7343-4d1c-9009-8e7cd5025fd7
            © Hasan M. Al-Refai. Published by BCS Learning and Development Ltd. Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009), Philadelphia University, Amman, Jordan

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009)
            ISIICT
            3
            Philadelphia University, Amman, Jordan
            15 - 17 December 2009
            Electronic Workshops in Computing (eWiC)
            Innovation and Information and Communication Technology (ISIICT 2009)
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ISIICT2009.9
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Cryptographic protocols,testing equivalence,Bisimulation ,authenticity and secrecy

            Comments

            Comment on this article