JAIST Repository >
School of Information Science >
Articles >
Journal Articles >

Please use this identifier to cite or link to this item: http://hdl.handle.net/10119/7881

Title: Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authors: Li, Guoqiang
Ogawa, Mizuhito
Issue Date: 2008
Publisher: Springer
Magazine name: Lecture Notes in Computer Science
Volume: 5311
Start page: 374
End page: 385
DOI: 10.1007/978-3-540-88387-6_32
Abstract: Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus on the concepts of corresponding assertion and key distribution. This paper proposes an on-the-fly model checking method based on the pushdown system to verify the authentication of recursive protocols with an unbounded number of principals. By experiments of the Maude implementation, we find the recursive authentication protocol, which was verified in the sense of (weak) key distribution, has a flaw in the sense of correspondence assertion.
Rights: This is the author-created version of Springer, Guoqiang Li, Mizuhito Ogawa, Lecture Notes in Computer Science, 5311, 2008, 374-385. The original publication is available at www.springerlink.com, http://dx.doi.org/10.1007/978-3-540-88387-6_32
URI: http://hdl.handle.net/10119/7881
Material Type: author
Appears in Collections:b10-1. 雑誌掲載論文 (Journal Articles)

Files in This Item:

File Description SizeFormat
ATVA08.pdf249KbAdobe PDFView/Open

All items in DSpace are protected by copyright, with all rights reserved.


Contact : Library Information Section, Japan Advanced Institute of Science and Technology