期刊文献+

链空间方法在密码协议设计中的应用 被引量:1

Application of Strand Space Method for Design of Cryptographic Protocols
下载PDF
导出
摘要 设计安全、有效的密码协议是密码学和通讯领域的一个十分重要的研究课题,与密码协议的形式化分析方法究同步发展。文章在研究链空间模型和认证测试思想的基础上,采用链空间方法指导密码协议的设计,并设计了一个于公钥密码体制的协议PCP。 Design of secure and effective cryptographic protocols is an important research subject in cryptography and communication area,as well as formal techniques applied to analysis of cryptographic protocols.This paper adopts the strand space method to direct the designing of cryptographic protocols on the base of studying the strand space method and authentication test ideas.It also designs a new protocol PCP based on public key cryptography.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第5期92-95,共4页 Computer Engineering and Applications
关键词 密码协议 协议设计 链空间 认证测试 cryptographic protocols,protocol design,strand space,authentication test
  • 相关文献

参考文献4

  • 1Javier Thayer Fabrega,Jonathan C Herzog,Joshua D Guttman. Strand Spaces:Why is A Security Protocol Correct[C].In :Proceedings of the 1998 IEEE Symposium on Security and Privacy,IEEE Computer Society Press, 1998 ;5:160~171.
  • 2Javier Thayer Fabrega,Jonathan C Herzog,Joshua D Guttman.Strand Spaces :Proving Security Protocols Correct[J].Journal of Computer Security, 1999; 7 (2): 191~230.
  • 3Gavin Lowe.A hierarchy of Authentication Specifications[C].In:10th Computer Security Foundations Workshop Proceedings,IEEE Computer Society Press, 1997:31~43.
  • 4Joshua D Guttman,Javier Thayer Fabrega. Authentication Tests and the Structure of Bundles[J].Theoretical Computer Science,2002.

同被引文献15

  • 1杨明,罗军舟.基于认证测试的安全协议分析[J].软件学报,2006,17(1):148-156. 被引量:16
  • 2刘家芬,周明天.认证测试方法对X.509认证协议的分析[J].计算机工程与应用,2006,42(8):23-25. 被引量:2
  • 3李谢华,李建华,杨树堂.基于认证测试的通用安全协议设计方法[J].上海交通大学学报,2006,40(3):524-527. 被引量:4
  • 4王鹏,李谢华,陆松年.基于认证测试方法的EAP-AKA协议分析[J].计算机工程与应用,2007,43(15):157-159. 被引量:9
  • 5Guttman J D,Fàbrega F J T.Authentication tests[C] //Proceed-ings of the2000IEEE Symp on Security and Privacy.Los Alamitos:IEEE Computer Society Press,2000:96-109.
  • 6Guttman J D,Fàbrega F J T.Authentication tests and the structure of bundles[J].Theoretical Computer Science,2002,283(2):333-380.
  • 7Guttman J D,Fàbrega F J T.Key compromise,strand spaces and the authentication tests[C] //Proceedings of the17th Conf on the Mathematical Foundations of Programming Semantics.[S.l.] :Elsevier BV,2001:141-161.
  • 8Fàbrega F J T,Herzog J C,Guttman J D.Strand spaces:why is a security protocol correct[C] //Proceedings of the1998IEEE Symposium on Security and Privacy.Los Alamitos:IEEE Computer Society Press,1998:160-171.
  • 9Fàbrega F J T,Herzog J C,Guttman J D.Strand spaces:prov-ing security protocols correct[J].Journal of Computer Security,1999,7(2/3):191-230.
  • 10Fabrega F J T,Herzog J C,Guttman J D.Honest ideals on strand space[C] //Proceedings of the11th IEEE Computer Security Foundations Workshop.Washington:IEEE Computer Society Press,1998:66-77.

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部