Blog
About

106
views
0
recommends
+1 Recommend
1 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      EVALUATION TECHNIQUE IN THE SPICALCULUS FOR CRYPTOGRAPHIC PROTOCOLS

      Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009) (ISIICT)

      Innovation and Information and Communication Technology (ISIICT 2009)

      15 - 17 December 2009

      Cryptographic protocols, testing equivalence, Bisimulation , authenticity and secrecy

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Bisimulation as a technique could be well invested for proving authenticity and secrecy properties of cryptographic protocols to gain the legality of protocol optimization. In this paper, we will do some changes in the spi-calculus after the original work of M.Abadi and A.Gordan. Then we will introduce evade bisimulation following Abadi and Gordan’s framed bisimulation proposal, in which a convenient proof technique is presented. It will impose minimality requirements on the environment and detect the limit beyond which the bisimilarity is kept valid and furthermore it will avoid quantification over contexts. Also, it will give a solution for input transitions for the case of finite processes. Based on the revised spi-calculus would be used to prove that evade bisimilarity, an equivalence relation, is decidable for main security properties: Authenticity and Secrecy.

          Related collections

          Author and article information

          Contributors
          Conference
          December 2009
          December 2009
          : 98-112
          Affiliations
          Mobile Phone #: 00962-777357755
          Article
          10.14236/ewic/ISIICT2009.9
          © Hasan M. Al-Refai. Published by BCS Learning and Development Ltd. Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009), Philadelphia University, Amman, Jordan

          This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

          Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009)
          ISIICT
          3
          Philadelphia University, Amman, Jordan
          15 - 17 December 2009
          Electronic Workshops in Computing (eWiC)
          Innovation and Information and Communication Technology (ISIICT 2009)
          Product
          Product Information: 1477-9358BCS Learning & Development
          Self URI (journal page): https://ewic.bcs.org/
          Categories
          Electronic Workshops in Computing

          Comments

          Comment on this article