Update Semantics of Security Protocols

Synthese 142 (2):229 - 267 (2004)
  Copy   BIBTEX

Abstract

We present a model-theoretic approach for reasoning about security protocols, applying recent insights from dynamic epistemic logics. This enables us to describe exactly the subsequent epistemic states of the agents participating in the protocol, using Kripke models and transitions between these based on updates of the agent's beliefs associated with steps in the protocol. As a case study we will consider the SRA Three Pass protocol and discuss the Wide-Mouthed Frog protocol

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 100,448

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

A logic for extensional protocols.Ben Rodenhäuser - 2011 - Journal of Applied Non-Classical Logics 21 (3-4):477-502.
LTL model checking for security protocols.Alessandro Armando, Roberto Carbone & Luca Compagna - 2009 - Journal of Applied Non-Classical Logics 19 (4):403-429.
Verifying epistemic protocols under common knowledge.Yanjing Wang, Lakshmanan Kuppusamy & Jan van Eijck - 2009 - Proceedings of the 11th Conference on Theoretical Aspects of Rationality and Knowledge - Tark ’09:257--266.
Verifying one hundred prisoners and a lightbulb.Hans van Ditmarsch & Jan van Eijck - 2010 - Journal of Applied Non-Classical Logics 20 (3):173-191.

Analytics

Added to PP
2009-01-28

Downloads
69 (#301,274)

6 months
10 (#381,237)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

Dynamic Formal Epistemology.Patrick Girard, Olivier Roy & Mathieu Marion (eds.) - 2010 - Berlin, Germany: Springer.

Add more citations

References found in this work

Add more references