JAIST Repository >
School of Information Science >
Articles >
Journal Articles >
Please use this identifier to cite or link to this item:
http://hdl.handle.net/10119/7881
|
Title: | Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol |
Authors: | Li, Guoqiang Ogawa, Mizuhito |
Issue Date: | 2008 |
Publisher: | Springer |
Magazine name: | Lecture Notes in Computer Science |
Volume: | 5311 |
Start page: | 374 |
End page: | 385 |
DOI: | 10.1007/978-3-540-88387-6_32 |
Abstract: | Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus on the concepts of corresponding assertion and key distribution. This paper proposes an on-the-fly model checking method based on the pushdown system to verify the authentication of recursive protocols with an unbounded number of principals. By experiments of the Maude implementation, we find the recursive authentication protocol, which was verified in the sense of (weak) key distribution, has a flaw in the sense of correspondence assertion. |
Rights: | This is the author-created version of Springer, Guoqiang Li, Mizuhito Ogawa, Lecture Notes in Computer Science, 5311, 2008, 374-385. The original publication is available at www.springerlink.com, http://dx.doi.org/10.1007/978-3-540-88387-6_32 |
URI: | http://hdl.handle.net/10119/7881 |
Material Type: | author |
Appears in Collections: | b10-1. 雑誌掲載論文 (Journal Articles)
|
Files in This Item:
File |
Description |
Size | Format |
ATVA08.pdf | | 249Kb | Adobe PDF | View/Open |
|
All items in DSpace are protected by copyright, with all rights reserved.
|