A logic of communication in hostile environment

The author adapts a knowledge-oriented model of distributed systems in order to analyze cryptographic protocols. This new model provides semantics for a logic of knowledge, time and communication. He expresses and proves with this logic security properties as secrecy and authentication.<<ETX>>

[1]  Jonathan K. Millen,et al.  The Interrogator: Protocol Secuity Analysis , 1987, IEEE Transactions on Software Engineering.

[2]  Glenn H. MacEwen,et al.  Reasoning about Knowledge and Permission in Secure Distributed Systems , 1988, CSFW.

[3]  P. Venkat Rangan,et al.  An axiomatic basis of trust in distributed systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[4]  K. Mani Chandy,et al.  How processes learn , 1985, ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing.

[5]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[6]  Catherine A. Meadows,et al.  Using narrowing in the analysis of key management protocols , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[7]  Joseph Y. Halpern,et al.  Knowledge and common knowledge in a distributed environment , 1984, JACM.

[8]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[9]  Martín Abadi,et al.  Authentication: A Practical Study in Belief and Action , 1988, TARK.

[10]  J. Hintikka Knowledge and belief , 1962 .

[11]  Nancy A. Lynch,et al.  Cryptographic protocols , 1982, STOC '82.

[12]  M. Sato A Study of Kripke-type Models for Some Modal Logics by Gentzen's Sequential Method , 1977 .

[13]  Max J. Cresswell,et al.  A New Introduction to Modal Logic , 1998 .