Formal analysis of cryptographic protocols by reasoning based on deontic relevant logic: A case study in Needham-Schroeder Shared-Key protocol.
Kazunori WagatsumaYuichi GotoJingde ChengPublished in: ICMLC (2012)
Keyphrases
- formal analysis
- cryptographic protocols
- authentication protocol
- public key
- ban logic
- deontic logic
- secure communication
- classical logic
- security analysis
- security properties
- signature scheme
- standard model
- formal methods
- legal reasoning
- agent model
- logic programming
- knowledge base
- secret key
- modal logic
- security protocols
- encryption scheme
- real time
- smart card
- information systems