Abstract
Previous work on proving non-repudiation properties using the Inductive Method seems to be reusable for proving delegation properties. Current experiments with Crispo’s delegation protocol support this claim. It follows that the two properties are closely related, though they are used in different contexts to convey different guarantees. It is expected that one man-month is required to develop full machine proofs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bella, G.: Modelling Agents’ Knowledge Inductively. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 85–94. Springer, Heidelberg (2000)
Bella, G., Paulson, L.C.: A Proof of Non-Repudiation. In: Proc. of the 9th International Workshop on Security Protocols. LNCS Series. Springer, Heidelberg (2001) (in Press)
Bella, G., Paulson, L.C.: Mechanical Proofs about a Non-Repudiation Protocol. In: Boulton, R.J., Jackson, P.B. (eds.) TPHOLs 2001. LNCS, vol. 2152, pp. 91–104. Springer, Heidelberg (2001)
Crispo, B.: Delegation Protocols for Electronic Commerce. In: Proc. of the 6th Symposium on Computers and Communications (ISCC 2001). IEEE Press, Los Alamitos (2001)
Crispo, B., Ruffo, G.: Reasoning about Accountability within Delegation. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, p. 251. Springer, Heidelberg (2001)
Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security 6, 85–128 (1998)
Zhou, J., Gollmann, D.: A Fair Non-Repudiation Protocol. In: Proc. of the 15th IEEE Symposium on Security and Privacy, pp. 55–61. IEEE Press, Los Alamitos (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bella, G., Paulson, L.C. (2004). Analyzing Delegation Properties. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-39871-4_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20830-3
Online ISBN: 978-3-540-39871-4
eBook Packages: Springer Book Archive