{"title":"李约瑟-施罗德家族的协议派生系统","authors":"Junwei Zhang, Jianfeng Ma, Chao Yang","doi":"10.1002/sec.565","DOIUrl":null,"url":null,"abstract":"A framework consisting of the Protocol Derivation System (PDS) and Protocol Composition Logic (PCL) has been recently proposed by Datta et al. for the design and analysis of secure composition of cryptographic protocols. However, the PDS in this proposed framework can only be used for the protocols of the Station-to-Station family, which are signature-based authenticated Diffie-Hellman key exchange protocols. In this paper, the PDS is extended to support key exchange protocols using a Trusted Third Party and encryption based authentication such as those in the Needham-Schroeder family. This is achieved by means of adding new components, refinements and transformations to the PDS. In addition, the derivation graph of the Needham-Schroeder family is developed by using the extended PDS.","PeriodicalId":339961,"journal":{"name":"2011 6th International ICST Conference on Communications and Networking in China (CHINACOM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Protocol Derivation System for the Needham-Schroeder family\",\"authors\":\"Junwei Zhang, Jianfeng Ma, Chao Yang\",\"doi\":\"10.1002/sec.565\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A framework consisting of the Protocol Derivation System (PDS) and Protocol Composition Logic (PCL) has been recently proposed by Datta et al. for the design and analysis of secure composition of cryptographic protocols. However, the PDS in this proposed framework can only be used for the protocols of the Station-to-Station family, which are signature-based authenticated Diffie-Hellman key exchange protocols. In this paper, the PDS is extended to support key exchange protocols using a Trusted Third Party and encryption based authentication such as those in the Needham-Schroeder family. This is achieved by means of adding new components, refinements and transformations to the PDS. In addition, the derivation graph of the Needham-Schroeder family is developed by using the extended PDS.\",\"PeriodicalId\":339961,\"journal\":{\"name\":\"2011 6th International ICST Conference on Communications and Networking in China (CHINACOM)\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-08-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 6th International ICST Conference on Communications and Networking in China (CHINACOM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/sec.565\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 6th International ICST Conference on Communications and Networking in China (CHINACOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/sec.565","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Protocol Derivation System for the Needham-Schroeder family
A framework consisting of the Protocol Derivation System (PDS) and Protocol Composition Logic (PCL) has been recently proposed by Datta et al. for the design and analysis of secure composition of cryptographic protocols. However, the PDS in this proposed framework can only be used for the protocols of the Station-to-Station family, which are signature-based authenticated Diffie-Hellman key exchange protocols. In this paper, the PDS is extended to support key exchange protocols using a Trusted Third Party and encryption based authentication such as those in the Needham-Schroeder family. This is achieved by means of adding new components, refinements and transformations to the PDS. In addition, the derivation graph of the Needham-Schroeder family is developed by using the extended PDS.