[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11565))

  • 434 Accesses

Abstract

I offer some reminiscences about work by Cathy Meadows as well as about working with and for Cathy Meadows. I also recall cryptographic protocol properties introduced in our work in the 1990s and show their applicability to analyzing novel protocols today. Specifically, I describe a recent protocol [8] for anonymous proof of account ownership using the novel primitive of secure channel injection (SCI). And I describe how the claim of transcript privacy for a specific SCI protocol depends on an implicit and not necessarily justified assumption of key virginity. I also discuss ways to modify the protocol to achieve intended goals.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook
GBP 12.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2, August 2008. https://tools.ietf.org/html/rfc5246

  2. Kemmerer, R., Meadows, C., Millen, J.: Three systems for cryptographic protocol analysis. J. Cryptol. 7(2), 79–130 (1994)

    Article  Google Scholar 

  3. Meadows, C.: Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE J. Sel. Areas Commun. 21(1), 44–54 (2003)

    Article  Google Scholar 

  4. Meadows, C.: Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later. In: Martí-Oliet, N., Ölveczky, P.C., Talcott, C. (eds.) Logic, Rewriting, and Concurrency. LNCS, vol. 9200, pp. 475–492. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-23165-5_22

    Chapter  MATH  Google Scholar 

  5. Meadows, C.A.: Formal verification of cryptographic protocols: a survey. In: Pieprzyk, J., Safavi-Naini, R. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 133–150. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0000430

    Chapter  Google Scholar 

  6. Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3, August 2018. https://tools.ietf.org/html/rfc8446

  7. Syverson, P., Meadows, C.: A formal language for cryptographic protocol requirements. Des. Codes Crypt. 7(1/2), 27–59 (1996)

    Article  MathSciNet  Google Scholar 

  8. Wang, L., Asharov, G., Pass, R., Ristenpart, T., shelat, a.: Blind certificate authorities. In: Proceedings of the 40th IEEE Symposium on Security and Privacy (S&P 2019), May 2019. https://eprint.iacr.org/2018/1022

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paul Syverson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 This is a U.S. government work and not under copyright protection in the U.S.; foreign copyright protection may apply

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Syverson, P. (2019). Key Reminiscences. In: Guttman, J., Landwehr, C., Meseguer, J., Pavlovic, D. (eds) Foundations of Security, Protocols, and Equational Reasoning. Lecture Notes in Computer Science(), vol 11565. Springer, Cham. https://doi.org/10.1007/978-3-030-19052-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-19052-1_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-19051-4

  • Online ISBN: 978-3-030-19052-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics