Analysis of cryptographic protocols using logics of belief: an overview

When designing a cryptographic protocol or explaining it, one often uses arguments such as ``since this message was signed by machine B, machine A can be sure it came from B`` in informal proofs justifying how the protocol works. Since it is, in such informal proofs, often easy to overlook an essen...

Full description

Bibliographic Details
Published in:Journal of Telecommunications and Information Technology
Main Author: David Monniaux
Format: Article
Language:English
Published: National Institute of Telecommunications 2002-12-01
Subjects:
Online Access:https://jtit.pl/jtit/article/view/145