Skip to main content

An Extended Logic for Analyzing Timed-Release Public-Key Protocols

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1726))

Abstract

A logic is presented for analyzing public key protocols which provide time-dependent confidentiality using a trusted party. The logic is developed as an extension to an existing cryptographic modal logic with time due to Coffey and Saidha. The extension is designed to help capture aspects of timed-release public key protocols that are not captured in the Coffey-Saidha logic. The explicit use of time in the logic is shown to facilitate reasoning about the correctness of an example protocol.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, M., Tuttle, M.: A Semantics for a Logic of Authentication. In: Proc. 10th ACM Symposium on Principles of Distributed Computing, pp. 201–216 (August 1991)

    Google Scholar 

  2. Bieber, P.: A Logic of Communication in Hostile Environment. In: Proc. IEEE Computer Security Foundations Workshop, pp. 14–22 (1990)

    Google Scholar 

  3. Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Trans. on Computer Systems 8(1), 18–36 (1990)

    Article  Google Scholar 

  4. Coffey, T., Saidha, P.: Logic for Verifying Public-Key Cryptographic Protocols. IEEE Proc. Computers and Digital Techniques 144(1), 28–32 (1997)

    Article  MATH  Google Scholar 

  5. Gong, L., Needham, R., Yahalom, R.: Reasoning about Belief in Cryptographic Protocols. In: Proc. IEEE Symposium on Security and Privacy, pp. 234–248 (May 1990)

    Google Scholar 

  6. Gong, L., Syverson, P.: Fail-Stop Protocols: An Approach to Designing Secure Protocols. In: Pre-proc. 5th IFIP Working Conference on Dependable Computing for Critical Applications, pp. 44–55 (September 1995)

    Google Scholar 

  7. Mao, W., Boyd, C.: Towards Formal Analysis of Security Protocols. In: Proc. IEEE Computer Security Foundations Workshop, pp. 147–158 (1993)

    Google Scholar 

  8. Rivest, R.L., Shamir, A., Wagner, D.A.: Time-Lock Puzzles and Timed- Release Crypto. Technical Report, MIT Laboratory for Computer Science (1996)

    Google Scholar 

  9. Stubblebine, S.G., Wright, R.N.: An Authentication Logic Supporting Synchronization, Revocation, and Recency. In: Proc. 3rd ACM Conference on Computer and Communications Security, pp. 95–105 (March 1996)

    Google Scholar 

  10. Syverson, P.: Adding Time to a Logic of Authentication. In: Proc. 1st ACM Conference on Computer and Communications Security, pp. 97–101 (November 1993)

    Google Scholar 

  11. Syverson, P., van Oorschot, P.: On Unifying Some Cryptographic Protocol Logics. In: Proc. IEEE Symposium on Security and Privacy, pp. 14–28 (May 1994)

    Google Scholar 

  12. Wedel, G., Kessler, V.: Formal Semantics for Authentication Logics. In: Proc. European Symposium on Research in Security and Privacy, pp. 219–241 (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kudo, M., Mathuria, A. (1999). An Extended Logic for Analyzing Timed-Release Public-Key Protocols. In: Varadharajan, V., Mu, Y. (eds) Information and Communication Security. ICICS 1999. Lecture Notes in Computer Science, vol 1726. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-47942-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-47942-0_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66682-0

  • Online ISBN: 978-3-540-47942-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics