{"title":"绑定理论证明认证协议的前提条件","authors":"HaiFeng Xue","doi":"10.1109/GRC.2009.5255038","DOIUrl":null,"url":null,"abstract":"The paper proposes a binding theory and security prerequisites proposition to authentication protocols. The binding theory constructs a formal theory model by which can quickly infer some security properties. Binding theory comes from the basic ideas that the key used in cryptographic protocols is the kernel component for the security protocols. Based on binding theory, security prerequisites proposition to authentication protocols is modeled and proved. Binding theory and security prerequisites proposition to authentication protocols can simply and efficiently decide security properties when authentication protocols have security weakness for authentication properties. Some classical security protocols are taken as examples to infer and discover some of their security properties broken by binding theory and security prerequisites proposition.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Prerequisites to authentication protocols proved by binding theory\",\"authors\":\"HaiFeng Xue\",\"doi\":\"10.1109/GRC.2009.5255038\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper proposes a binding theory and security prerequisites proposition to authentication protocols. The binding theory constructs a formal theory model by which can quickly infer some security properties. Binding theory comes from the basic ideas that the key used in cryptographic protocols is the kernel component for the security protocols. Based on binding theory, security prerequisites proposition to authentication protocols is modeled and proved. Binding theory and security prerequisites proposition to authentication protocols can simply and efficiently decide security properties when authentication protocols have security weakness for authentication properties. Some classical security protocols are taken as examples to infer and discover some of their security properties broken by binding theory and security prerequisites proposition.\",\"PeriodicalId\":388774,\"journal\":{\"name\":\"2009 IEEE International Conference on Granular Computing\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-09-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE International Conference on Granular Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GRC.2009.5255038\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on Granular Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GRC.2009.5255038","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Prerequisites to authentication protocols proved by binding theory
The paper proposes a binding theory and security prerequisites proposition to authentication protocols. The binding theory constructs a formal theory model by which can quickly infer some security properties. Binding theory comes from the basic ideas that the key used in cryptographic protocols is the kernel component for the security protocols. Based on binding theory, security prerequisites proposition to authentication protocols is modeled and proved. Binding theory and security prerequisites proposition to authentication protocols can simply and efficiently decide security properties when authentication protocols have security weakness for authentication properties. Some classical security protocols are taken as examples to infer and discover some of their security properties broken by binding theory and security prerequisites proposition.