Authentication by Witness Functions

03/14/2019
by   Jaouhar Fattahi, et al.
0

Witness functions have recently been introduced in cryptographic protocols' literature as a new powerful way to prove protocol correctness with respect to secrecy. In this paper, we extend them to the property of authentication. We show how to use them safely and we run an analysis on a modified version of the Woo-Lam protocol. We show that it is correct with respect to authentication.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/21/2018

A Theorem for Secrecy in Tagged Protocols Using the Theory of Witness-Functions

In this paper, we enunciate the theorem of secrecy in tagged protocols u...
research
12/05/2020

Automated Symbolic Verification of Telegram's MTProto 2.0

MTProto 2.0 is a suite of cryptographic protocols for instant messaging ...
research
01/16/2018

Relaxed Conditions for Secrecy in a Role-Based Specification

In this paper, we look at the property of secrecy through the growth of ...
research
11/25/2019

CANTO – Covert AutheNtication with Timing channels over Optimized traffic flows for CAN

Previous research works have endorsed the use of delays and clock skews ...
research
01/22/2021

An Enhanced Passkey Entry Protocol for Secure Simple Pairing in Bluetooth

In this paper, we propose a simple enhancement for the passkey entry pro...
research
04/28/2020

Specifying a Cryptographical Protocol in Lustre and SCADE

We present SCADE and Lustre models of the Message Authenticator Algorith...
research
02/06/2022

Heart-Based Biometric Protocols: A look back over almost two decades

This article surveys the literature over the period 2003-2021 on heart-b...

Please sign up or login with your details

Forgot password? Click here to reset