On the security of public key protocols

From MaRDI portal
Publication:3968876

DOI10.1109/TIT.1983.1056650zbMath0502.94005OpenAlexW2029693536MaRDI QIDQ3968876

Andrew Chi-Chih Yao, Danny Dolev

Publication date: 1983

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/tit.1983.1056650




Related Items (only showing first 100 items - show all)

Protocol insecurity with a finite number of sessions and composed keys is NP-complete.Three systems for cryptographic protocol analysisOn the verifiability of two-party algebraic protocolsProvable security analysis of FIDO2A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computingAnalysis of security protocols based on challenge-responseCryptanalysis and design of a three-party authenticated key exchange protocol using smart cardMoving the bar on computationally sound exclusive-orOn the design of cryptographic primitivesAttestation waves: platform trust via remote power analysisOn the security of p-party protocolsUpdate semantics of security protocolsA tutorial-style introduction to \(\mathsf{DY}^{\star}\)Security protocols as choreographiesSecure key management policies in strand spacesOn the complexity of verification of time-sensitive distributed systemsProbabilistic annotations for protocol models. Dedicated to Joshua GuttmanAn undecidability result for AGhComplete symbolic reachability analysis using back-and-forth narrowingDeciding knowledge in security protocols under equational theoriesFormal analysis of Kerberos 5On the semantics of Alice \& Bob specifications of security protocolsA rewriting-based inference system for the NRL protocol analyzer and its meta-logical propertiesA (restricted) quantifier elimination for security protocolsDecidability issues for extended ping-pong protocolsAttacking group protocols by refuting incorrect inductive conjecturesDecision procedures for the security of protocols with probabilistic encryption against offline dictionary attacksA formal language for cryptographic protocol requirementsModular verification of protocol equivalence in the presence of randomnessAutomated identification of desynchronisation attacks on shared secretsFormal analysis and offline monitoring of electronic examsIntruder deduction for the equational theory of abelian groups with distributive encryptionA collusion problem and its solutionSymbolic reachability analysis using narrowing and its application to verification of cryptographic protocolsA game-theoretic framework for specification and verification of cryptographic protocolsPrivacy and verifiability in voting systems: methods, developments and trendsHow to simulate it in Isabelle: towards formal proof for secure multi-party computationTo know or not to know: Epistemic approaches to security protocol verificationAuthenticated confidential channel establishment and the security of TLS-DHEUniversally composable symbolic security analysisTimed models of security protocols including delays in the networkUsing probabilistic automata for security protocols verificationReducing equational theories for the decision of static equivalenceFormally sound implementations of security protocols with JavaSPIState space reduction in the Maude-NRL protocol analyzerBounded memory Dolev-Yao adversaries in collaborative systemsLattice-based completely non-malleable public-key encryption in the standard modelAn inductive approach to strand spacesProtocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-completeEfficient representation of the attacker's knowledge in cryptographic protocols analysisImprovement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart cardA Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS appsAutomated type-based analysis of injective agreement in the presence of compromised principalsA formal semantics for protocol narrationsThe reactive simulatability (RSIM) framework for asynchronous systemsTransducer-based analysis of cryptographic protocolsA novel quantum dragonfly multi-key exchange protocol beyond conventional attacksIntruder deducibility constraints with negation. Decidability and application to secured service compositionsDesign and analysis of a three party password-based authenticated key exchange protocol using extended chaotic mapsCryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptographyIntruder deduction problem for locally stable theories with normal forms and inversesA Maude environment for CafeOBJCollaborative planning with confidentialitySecrecy and group creationDealing with logical omniscience: expressiveness and pragmaticsDistributed temporal logic for the analysis of security protocol modelsCancellation rules and extended word problemsReachability results for timed automata with unbounded data structuresThe RSA group is pseudo-freeAn NP decision procedure for protocol insecurity with XORSimulation relations for alternating Büchi automataA method for symbolic analysis of security protocolsA computational interpretation of Dolev-Yao adversariesAbstract interpretation of mobile systemsSymbolic protocol analysis in the union of disjoint intruder theories: combining decision proceduresInvariant-based reasoning about parameterized security protocolsSafe abstractions of data encodings in formal security protocol modelsAbstractions of non-interference security: probabilistic versus possibilisticOn the complexity of some extended word problems defined by cancellation rulesOn a new formal proof model for RFID location privacyPRUB: A privacy protection friend recommendation system based on user behaviorPing-pong protocols as prefix grammars: modelling and verification via program transformationComputationally sound implementations of equational theories against passive adversariesCombining proverif and automated theorem provers for security protocol verificationAnalyzing security protocols using time-bounded task-PIOAsReachability is decidable for weakly extended process rewrite systemsEasy intruder deduction problems with homomorphismsEphemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environmentsBounded memory protocolsA formal framework for security testing of automotive over-the-air update systemsAnalysis of security protocols as open systemsOn the symbolic reduction of processes with cryptographic functions.A new logic for electronic commerce protocolsModels and emerging trends of concurrent constraint programmingAuthentication tests and the structure of bundles.Validating firewalls using flow logicsFinite-state analysis of two contract signing protocolsComment on the ``Quantum public-key cryptosystemOn the security of name-stamp protocolsFormalizing provable anonymity in Isabelle/HOL




This page was built for publication: On the security of public key protocols