usenix conference policies
Verifying Cryptographic Protocols for Electronic Commerce
Error message
You are not authorized to post comments.Randall W. Lichota, Hughes; Grace L. Hammonds, AGCS, Inc.; Stephen H. Brackin, Arca Systems, Inc.
This paper describes the Convince toolset for detecting common errors in cryptographic protocols, protocols of the sort used in electronic commerce. We describe using Convince to analyze confidentiality, authentication, and key distribution in a recently developed protocol proposed for incorporation into a network bill-payment system, a public-key version of the Kerberos authentication protocol. Convince incorporates a "belief logic" formalism into a theorem-proving environment that automatically proves whether a protocol can meet its goals. Convince allows an analyst to model a protocol using a tool originally designed for Computer-Aided Software Engineering (CASE).
author = {Randall W. Lichota and Grace L. Hammonds and Stephen H. Brackin},
title = {Verifying Cryptographic Protocols for Electronic Commerce},
booktitle = {2nd USENIX Workshop on Electronic Commerce (EC 96)},
year = {1996},
address = {Oakland, CA},
url = {https://www.usenix.org/conference/2nd-usenix-workshop-electronic-commerce/verifying-cryptographic-protocols-electronic},
publisher = {USENIX Association},
month = nov
}
connect with us