Secrecy by typing in security protocols
-
- Martín Abadi
- Lucent Technologies, Palo Alto, CA
Description
<jats:p>We develop principles and rules for achieving secrecy properties in security protocols. Our approach is based on traditional classification techniques, and extends those techniques to handle concurrent processes that use shared-key cryptography. The rules have the form of typing rules for a basic concurrent language with cryptographic primitives, the spi calculus. They guarantee that, if a protocol typechecks, then it does not leak its secret inputs.</jats:p>
Journal
-
- Journal of the ACM
-
Journal of the ACM 46 (5), 749-786, 1999-09
Association for Computing Machinery (ACM)
- Tweet
Details 詳細情報について
-
- CRID
- 1361981470012770432
-
- NII Article ID
- 30021964089
-
- ISSN
- 1557735X
- 00045411
-
- Data Source
-
- Crossref
- CiNii Articles