Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10330111 | Future Generation Computer Systems | 2005 | 9 Pages |
Abstract
We use two authentication primitives proposed recently as a linguistic support for enforcing authentication. They offer a way of abstracting from various specifications of authentication and of obtaining idealized protocols “secure by construction”. Consequently, they help in proving that a cryptographic protocol correctly implements its corresponding abstract version; when the implementation is incorrect, suggestions on how to fix it may come from reasoning on the abstract specification.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Computational Theory and Mathematics
Authors
C. Bodei, P. Degano, R. Focardi, C. Priami,