Affiliation:
1. Anhui Jianzhu University
Abstract
We introduce cryptographic primitives to the symbolic transition graph with the binary equivalence relation based on the CCS language with value-passing processes, which is designed for the description and analysis of security protocols. The STGR with cryptographic primitives, which is an extension of the STG, is applied to partition domains of conversations of security protocols that run in an infinite concurrent way, where principals possessing their relevant keys have received and transformed the message. The cryptographic primitives enable us to consider cryptographic issues on the principal conversations of security protocols in more detail. Our work results in a highly efficient solution to reduce computational complexities to prove safety properties of security protocols.
Publisher
Trans Tech Publications, Ltd.
Reference8 articles.
1. F. Javier Thayer Fábrega, Jonathan C. Herzog, and Joshua D. Guttman: Strand spaces: proving security protocols correct. Journal of Computer Security, Vol. 7 (1999), pp.191-230.
2. Joshua D. Guttman, and F. Javier Thayer: Authentication tests and the structure of bundles. Theoretical Computer Science, Vol. 283 (2002), pp.333-380.
3. Milner, R.: Communicating and Mobile Systems: the π-Calculus. Computer Laboratory, University of Cambridge, Cambridge University Press, (1999).
4. Hennessy M., Lin H.: Symbolic Bisimulations. Theoretical Computer Science, Vol. 138 (1995), pp.353-389.
5. Milner, R.: The space and motion of communicating agents. Cambridge University Press, (2009).