Analyzing iKP security in applied pi calculus

  • Authors:
  • Yonggen Gu;Guoqiang Li;Yuxi Fu

  • Affiliations:
  • BASICS, Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China;BASICS, Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China;BASICS, Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China

  • Venue:
  • CIS'04 Proceedings of the First international conference on Computational and Information Science
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

The security for electronic payments is very important in electronic commerce. Many electronic payment protocols have been proposed recently to meet the security requirements. Since the design of a protocol is a difficult and error-prone task, the use of formal methods that allow for the verification of such protocols has received increasing attention. In this paper we take a look at the iKP from the point of view of the applied pi calculus. The iKP is described in the calculus and some security properties, mainly the authentication and anonymity properties, are verified.