Loading...
Please wait, while we are loading the content...
Similar Documents
A Calculus for Cryptographic Protocols - The Spi Calculus (1998)
| Content Provider | CiteSeerX |
|---|---|
| Author | Abadi, MartÃn Gordon, Rew D. |
| Abstract | We introduce the spi calculus, an extension of the pi calculus designed for describing and analyzing cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) su#ces for some abstract protocols; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as processes in the spi calculus and state their security properties in terms of coarse-grained notions of protocol equivalence. Contents 1 Security and the Pi Calculus 1 2 Protocols using Restricted Channels 3 2.1 Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2 Outline of the Pi Calculus . . . . . . . . . . . . . . . . . . . . 4 2.3 Examples using Restricted Channels . . . . . . . . . . . . . . 6 2.3.1 A first example . . . . . . . . . . . . . . . . . . . . . . 6 2.3.2 An example with channel establishment . . . . . . . . 8 2.3.3 Discussion . . . . . . . . . . . . . . . . ... |
| File Format | |
| Volume Number | 148 |
| Journal | Information and Computation |
| Language | English |
| Publisher Date | 1998-01-01 |
| Access Restriction | Open |
| Subject Keyword | Spi Calculus Pi Calculus Cryptographic Protocol Restricted Channel Abstract Protocol Security Property Su Ce First Example Coarse-grained Notion Authentication Protocol Protocol Equivalence Channel Establishment Cryptographic Issue |
| Content Type | Text |
| Resource Type | Article |