Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract)

  • Authors:
  • Marie-Jeanne Toussaint

  • Affiliations:
  • -

  • Venue:
  • CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
  • Year:
  • 1991

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper shows how to derive a representation of the participants' knowledge in a cryptographic protocol. The modelization is based on the assumption that the underlying cryptographic system is perfect and is an extension of the "Hidden Automorphism Model" introduced by Merritt. It can be used to establish the security of the protocols.