Abstract
Public key encryption as used in network communication has been investigated extensively. The main advantage of the techniques developed in this a rea is the potential for secure communication. However, while public key systems are often effective in preventing a passive saboteur from deciphering an intercepted message, protocols must be designed to be secure when dealing with saboteurs who can impersonate users or send copies of intercepted messages on the public channel. Dolev and Yao [3] have shown how informal arguments about protocols can lead to erroneous conclusions, and they have developed formal models of two-party protocols, both cascade protocols and name-stamp protocols. Recall that a protocol is a set of rules that specify what operators a pair of users, the sender and the receiver, need to apply in an exchange of messages for the purpose of transmitting a given plaintext message from the sender to the receiver. In terms of their models, Dolev and Yao developed an elegant characterization of cascade protocols that are secure, a characterization with conditions that can be checked by inspection.
Chapter PDF
Similar content being viewed by others
References
R.V. Book and F. Otto, On the security of name-stamp protocols, Theoret. Comput. Sci. 40 (1985), to appear.
W. Diffie and M. Hellman, New directions in cryptography, IEEE Trans. Information Theory IT-22 (1976), 644–654.
D. Dolev and A. Yao, On the security of public key protocols, IEEE Trans. Information Theory IT-29 (1983), 198–208. An extended abstract appears in Proc. 22nd IEEE Symp. Foundations of Computer Science (1981), 350–357.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1986 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Book, R.V., Otto, F. (1986). The Verifiability of Two-Party Protocols. In: Pichler, F. (eds) Advances in Cryptology — EUROCRYPT’ 85. EUROCRYPT 1985. Lecture Notes in Computer Science, vol 219. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39805-8_30
Download citation
DOI: https://doi.org/10.1007/3-540-39805-8_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-16468-5
Online ISBN: 978-3-540-39805-9
eBook Packages: Springer Book Archive