Types and Effects for Asymmetric Cryptographic Protocols

@inproceedings{Gordon2002TypesAE,
  title={Types and Effects for Asymmetric Cryptographic Protocols},
  author={Andrew D. Gordon and Alan Jeffrey},
  booktitle={CSFW},
  year={2002}
}
We present the first type and effect system for proving authen ticity properties of security protocols based on asymmetric cryptography. Th e most significant new features of our type system are: (1) a separation of public types(for data possibly sent to the opponent) from tainted types(for data possibly received from the opponent) via a subtype relation; (2) trust effects , to guarantee that tainted data does not, in fact, originate from the opponent; and (3) challenge/response types to… CONTINUE READING
Highly Influential
This paper has highly influenced 12 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 209 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.
123 Citations
27 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 123 extracted citations

209 Citations

0102030'01'04'08'12'16
Citations per Year
Semantic Scholar estimates that this publication has 209 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 27 references

Types and effects for asy graphic protocols. In15th IEEE Computer Security Foundations Workshop, pages 77–91

  • A. D. Gordon, A. Jeffrey
  • IEEE Computer Society Press,
  • 2002

Athena

  • D. Song, S. Berezin, A. Perrig
  • a novel ap cient automatic security protocol…
  • 2001

On the security of public key protocols

  • A. C. Yao
  • IEEE Transactions on Information Theory , IT
  • 2001

Subtyping dependent types

  • A. D. Gordon
  • Theoretical Computer Science
  • 2001

Similar Papers

Loading similar papers…