Hiding names: private authentication in the applied pi calculus

  • Authors:
  • Cédric Fournet;Martín Abadi

  • Affiliations:
  • Microsoft Research;University of California at Santa Cruz

  • Venue:
  • ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present the analysis of a protocol for private authentication in the applied pi calculus. We treat authenticity and secrecy properties of the protocol. Although such properties are fairly standard, their formulation in the applied pi calculus makes an original use of process equivalences. In addition, we treat identity-protection properties, which are a delicate concern in several recent protocol designs.