Pattern-matching spi-calculus
نویسندگان
چکیده
منابع مشابه
Pattern-Matching Spi-Calculus
Cryptographic protocols often make use of nested cryptographic primitives, for example signed message digests, or encrypted signed messages. Gordon and Jeffrey’s prior work on types for authenticity did not allow for such nested cryptography. In this work, we present the pattern-matching spi-calculus, which is an obvious extension of the spi-calculus to include pattern-matching as primitive. Th...
متن کاملSpi - Calculus
In the eld of process algebras, the spi-calculus, a modi-ed version of the-calculus with encryption primitives, is indicated as an expressive speciication language for cryptographic protocols. In spi-calculus basic security properties, such as secrecy and integrity can be formalized as may-testing equivalences which do not seem easily ex-tendible to express other kinds of interesting properties...
متن کاملAlgebraic Pattern Matching in Join Calculus
We propose an extension of the join calculus with pattern matching on algebraic data types. Our initial motivation is twofold: to provide an intuitive semantics of the interaction between concurrency and pattern matching; to define a practical compilation scheme from extended join definitions into ordinary ones plus ML pattern matching. To assess the correctness of our compilation scheme, we de...
متن کاملApplying Spi - calculus for PayWord *
Achieving strong security properties is a core part of wide acceptance of electronic commerce, hence it is essential to provide detailed security analysis for cryptographic protocols. There are protocols considered secure for a long time, still it is shown they contain flaws. Therefore it has been recognized that informal arguments about protocol correctness are not reliable. Formal methods off...
متن کاملSpi Calculus Translated to π-Calculus Preserving May-Testing
We present a concise and natural encoding of the spicalculus into the more basic π-calculus and establish its correctness with respect to a formal notion of testing. This is particularly relevant for security protocols modelled in spi since the tests can be viewed as adversaries. The translation has been implemented in a prototype tool. As a consequence, protocols can be described in the spi ca...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information and Computation
سال: 2006
ISSN: 0890-5401
DOI: 10.1016/j.ic.2006.04.004