期刊文献+

基于类型的密码协议验证方法

A VERIFICATION METHOD OF CRYPTOGRAPHIC PROTOCOLS BASED ON TYPE
下载PDF
导出
摘要 探讨使用一组形式化的规则来验证密码协议安全属性的方法。这些规则基于传统的等级和信息流的思想,通过将其扩展后用来处理密码协议中的并发进程。通过这些规则可以向用户提供一种检测方法,该方法用于判断:如果协议通过了检测,则可以认为该协议没有泄漏任何秘密的消息。 The way which uses a set of formal rules to verify the security properties of cryptographic protocols is probed in this paper.These rules stem from traditional concepts of classification and information flow,and are used to deal with the concurrent process in cryptographic protocols after being expanded.A way of verification can be provided to clients through these rules for judging:if a protocol passes the checks,then it is regarded as does not leak its secret information any.
作者 李薇
出处 《计算机应用与软件》 CSCD 2009年第10期265-268,281,共5页 Computer Applications and Software
关键词 信息安全 密码协议 安全属性 秘密性 Information security Cryptographic protocols Security properties Secrecy
  • 相关文献

参考文献7

  • 1Abadi M, Blanchet B. Analyzing Security Protocols with Secrecy Types and Logic Programs[J]. Journal of the ACM 52.1 ,2005 : 102 - 146. 被引量:1
  • 2Abadi M, Blanchet B. Computer-Assisted Verication of a Protocol for Certied Emai [ J ]. Science of Computer Programming 2005, Special issu SAS03. 被引量:1
  • 3Laud P. Handling Encryption in an Analysis for Secure Information Flow[ C ]//P. Degano, editor, Programming Languages and Systems, 12th European Symposium on Programming,ESOP03,volume 2618 of LNCS, pages 159{173. Springer, Apr. 2003. 被引量:1
  • 4Abadi M. Secrecy by typing in secureity protocols [ J]. Journal of the ACM, 1999,46 (5) : 749 - 786. 被引量:1
  • 5Abadi M, Blanchet B. Secrecy Types for Asymmetric Communication [ C ]//F. Honsell and M. Miculan, editors, Foundations of Software Science and Computation Structures ( FoSSaCS 2001 ), volume 2030 of Lecture Notes on Computer Science, pages 25-41, Genova, Italy, Apr. 2001. Springer Verlag. 被引量:1
  • 6Abadi M, Grodon A D. A calculus for Cryptographic Protocols : The Spi calculus [ J]. In theProceedings of the Fourth ACM Conference on Communication Security, 1997,04. 被引量:1
  • 7Volpano D, Irvine C, Smith G. A sound type system for Secrure flow analysis [ J]. Journal of Computer Security, 1996,4 : 167 - 187. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部