Title :
On belief evolution in authentication protocols
Author :
Kailar, Rajashekar ; Gligor, Virgil D.
Author_Institution :
Dept. of Electr. Eng., Maryland Univ., College Park, MD, USA
Abstract :
Authentication protocols can be viewed from the perspective of the evolution of beliefs within a protocol run. Inference rules which ensue from this perspective are presented. These rules can be used to analyze the protocols which BAN logic can analyze. Additional protocols that can be analyzed include (1) interdomain authentication where principals must trust all authentication servers of the domains traversed according to a specific policy, and (2) where trust in the secrecy of the encryption key and belief ordering need to be established despite the lack of jurisdiction
Keywords :
cryptography; protocols; BAN logic; authentication protocols; belief evolution; belief ordering; encryption key; inference rules; secrecy; Authentication; Body sensor networks; Cryptography; Educational institutions; Formal specifications; Logic design; Privacy; Protocols; Security;
Conference_Titel :
Computer Security Foundations Workshop IV, 1991. Proceedings
Conference_Location :
Franconia, NH
Print_ISBN :
0-8186-2215-6
DOI :
10.1109/CSFW.1991.151576