Analyzing Delegation Properties
Previous work on proving non-repudiation properties using the Inductive Method seems to be reusable for proving delegation properties. Current experiments with Crispo’s delegation protocol support this claim. It follows that the two properties are closely related, though they are used in different contexts to convey different guarantees. It is expected that one man-month is required to develop full machine proofs.
KeywordsSecurity Protocol Proof Strategy False Claim Delegation Token Protocol Session
Unable to display preview. Download preview PDF.
- 2.Bella, G., Paulson, L.C.: A Proof of Non-Repudiation. In: Proc. of the 9th International Workshop on Security Protocols. LNCS Series. Springer, Heidelberg (2001) (in Press)Google Scholar
- 4.Crispo, B.: Delegation Protocols for Electronic Commerce. In: Proc. of the 6th Symposium on Computers and Communications (ISCC 2001). IEEE Press, Los Alamitos (2001)Google Scholar
- 6.Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security 6, 85–128 (1998)Google Scholar
- 7.Zhou, J., Gollmann, D.: A Fair Non-Repudiation Protocol. In: Proc. of the 15th IEEE Symposium on Security and Privacy, pp. 55–61. IEEE Press, Los Alamitos (1996)Google Scholar