Skip to main content

A New Semantics of Authentication Logic

  • Conference paper
  • First Online:
Book cover Information and Communications Security (ICICS 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2229))

Included in the following conference series:

Abstract

This paper discusses the semantics of authentication protocol, and then proposes a new formal logic system of authentication. It is useful and effective, not only in analyzing key establish protocols, but in analyzing identification authentication protocols, electronic commerce protocols and nonrepudiation protocols. And my logic needn’t the protocol idealization that has caused many problems in other BAN-like logic systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Burrows, M. Abadi, R. Needham. A logic of authentication, ACM trans. on Computer Systems, 1990, 8(1): 18–36.

    Article  Google Scholar 

  2. Li Gong, R. Needham, R. Yahalom, Reasoning About Belief in Cryptographic Protocols, Proc. 1990 IEEE Symp. Security and Privacy, 1990, 234–248.

    Google Scholar 

  3. P. Syverson, P. Van Oorshot. On Unifying Some Cryptographic Protocol Logics, Proc. IEEE Symp. Security and Privacy. 1994, 14–28.

    Google Scholar 

  4. Li Gong, Cryptographic Protocols for Distributed Systems, Ph. D. Thesis, 1990.

    Google Scholar 

  5. C. Boyd, W. Mao, Limitations of Logical Analysis of Cryptographic Protocols, Eurocrypt’93.

    Google Scholar 

  6. Sihan Qing, Notes on Logic Analysis of Cryptographic Protocols, Chinacrypt’96, 214–219.

    Google Scholar 

  7. T. Y. C. Woo and S. S. Lam. Authentication for Distributed Systems. Computer Vol. 25, No. 1, January 1992, 39–52.

    Google Scholar 

  8. Yifa Li, A New Semantics of BAN Logic. PhD Thesis.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, Y. (2001). A New Semantics of Authentication Logic. In: Qing, S., Okamoto, T., Zhou, J. (eds) Information and Communications Security. ICICS 2001. Lecture Notes in Computer Science, vol 2229. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45600-7_54

Download citation

  • DOI: https://doi.org/10.1007/3-540-45600-7_54

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42880-0

  • Online ISBN: 978-3-540-45600-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics