214
views
0
recommends
+1 Recommend
1 collections
    4
    shares
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      EVALUATION TECHNIQUE IN THE SPICALCULUS FOR CRYPTOGRAPHIC PROTOCOLS

      proceedings-article

      Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009) (ISIICT)

      Innovation and Information and Communication Technology (ISIICT 2009)

      15 - 17 December 2009

      Cryptographic protocols, testing equivalence, Bisimulation , authenticity and secrecy

      Bookmark

            Abstract

            Bisimulation as a technique could be well invested for proving authenticity and secrecy properties of cryptographic protocols to gain the legality of protocol optimization. In this paper, we will do some changes in the spi-calculus after the original work of M.Abadi and A.Gordan. Then we will introduce evade bisimulation following Abadi and Gordan’s framed bisimulation proposal, in which a convenient proof technique is presented. It will impose minimality requirements on the environment and detect the limit beyond which the bisimilarity is kept valid and furthermore it will avoid quantification over contexts. Also, it will give a solution for input transitions for the case of finite processes. Based on the revised spi-calculus would be used to prove that evade bisimilarity, an equivalence relation, is decidable for main security properties: Authenticity and Secrecy.

            Content

            Author and article information

            Contributors
            Conference
            December 2009
            December 2009
            : 98-112
            Affiliations
            [0001]Mobile Phone #: 00962-777357755
            Article
            10.14236/ewic/ISIICT2009.9
            75542a5d-7343-4d1c-9009-8e7cd5025fd7
            © Hasan M. Al-Refai. Published by BCS Learning and Development Ltd. Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009), Philadelphia University, Amman, Jordan

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009)
            ISIICT
            3
            Philadelphia University, Amman, Jordan
            15 - 17 December 2009
            Electronic Workshops in Computing (eWiC)
            Innovation and Information and Communication Technology (ISIICT 2009)
            Product
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Comments

            Comment on this article