Authentication tests and the structure of bundles

  title={Authentication tests and the structure of bundles},
  author={Joshua D. Guttman and F. Javier Thayer},
  journal={Theor. Comput. Sci.},
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can conclude that some principal possessing the relevant key has received and transformed the message in which v was emitted. In some circumstances, this principal must be a regular participant of the protocol, not the penetrator. An inference of this kind is an authentication test. We introduce two main kinds of authentication… CONTINUE READING
Highly Influential
This paper has highly influenced 13 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 250 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 101 extracted citations

Generalized Unsolicited Tests for Authentication Protocol Analysis

2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06) • 2006
View 16 Excerpts
Highly Influenced

Authentication tests and disjoint encryption: A design method for security protocols

Journal of Computer Security • 2004
View 8 Excerpts
Highly Influenced

Programming Languages and Systems

Lecture Notes in Computer Science • 2004
View 9 Excerpts
Highly Influenced

Security Protocol Design via Authentication Tests

CSFW • 2002
View 7 Excerpts
Highly Influenced

251 Citations

Citations per Year
Semantic Scholar estimates that this publication has 251 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.