A Logic to Model Time in Cryptographic Protocols

被引:1
作者
Lei Xinfeng [1 ]
Liu Jun [1 ]
Xiao Jumno [1 ]
机构
[1] PLA Univ Sci & Technol, Inst Commun Engn, Nanjing, Peoples R China
来源
ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS | 2008年
关键词
cryptographic protocol; logic; time;
D O I
10.1109/ISCSCT.2008.273
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A number of logics have been proposed to analyze the cryptographic protocols, but most of them cannot explicitly express time factor which plays an important role in protocols. In this paper, we present a logic to model the time in cryptographic protocols. Our logic is based on the predicate modal logic, so, the time factor can be expressed by invoking a time variable as a parameter of predicate and modal operators. Then, by associating specific time points to each protocol statement, time is considered in analyzing protocols. This makes it possible to model each agent's actions, knowledge and belief at different time. Our logic provides a facilitate method for analyzing the cryptographic protocols, especially the time-dependent cryptographic protocols.
引用
收藏
页码:399 / 403
页数:5
相关论文
共 12 条
  • [1] Abadi M., 1991, Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, P201, DOI 10.1145/112600.112618
  • [2] [Anonymous], 1996, MITLCSTR684
  • [3] A LOGIC OF AUTHENTICATION
    BURROWS, M
    ABADI, M
    NEEDHAM, RM
    [J]. PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871): : 233 - 271
  • [4] CLARE D, 2007, ELECT NOTES THEORETI, V186, P27
  • [5] Logic for verifying public-key cryptographic protocols
    Coffey, T
    Saidha, P
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 28 - 32
  • [6] Gong L., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P234, DOI 10.1109/RISP.1990.63854
  • [7] KIM K, 2000, 2000 IEEE INT C COMM, V3, P1743
  • [8] MICHIHARU K, 1999, 2 INT C INF COMM SEC, P183
  • [9] PETER T, 2006, J UNIVERS COMPUT SCI, V12, P1373
  • [10] Syverson P. F., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P14, DOI 10.1109/RISP.1994.296595