A formal model for systematic design of key establishment protocols

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Abstract

We present an abstract formal model for protocols, based on abstract logical secure channels. Unlike other models it is not primarily intended for protocol analysis but to serve as the top layer of a layered top-down design method for protocols. We show examples of key establishment protocols for which this model can be used. Modular design of protocols is supported with a concatenation theorem for protocols.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 3rd Australasian Conference, ACISP 1998, Proceedings
PublisherSpringer-Verlag London Ltd.
Pages332-343
Number of pages12
ISBN (Print)3540647325, 9783540647324
Publication statusPublished - 1 Jan 1998
Externally publishedYes
EventAustralasian Conference on Information Security and Privacy 1998 - Brisbane, Australia
Duration: 13 Jul 199815 Jul 1998
Conference number: 3rd
https://link.springer.com/book/10.1007/BFb0053715 (Proceedings)

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1438
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceAustralasian Conference on Information Security and Privacy 1998
Abbreviated titleACISP 1998
CountryAustralia
CityBrisbane
Period13/07/9815/07/98
Internet address

Cite this