Application of Ideal Analysis of Security Protocols
(1.School of Information Science & Engineering,Central South University,Changsha 410083,China;2.College of Mathematics & Computer Science,Jishou University,Jishou 416000,Hunan China)
[1] F JAVIER THAYER FABREGA,JONATHAN C HERZOG,JOSHUA D GUTTMAN.Honest Ideals on Strand Spaces [A].Proceedings of the 11th IEEE Computer Security Foundations Workshop [C].IEEE Computer Sociery Press,1998.[2] F JAVIER THAYER FABREGA,JONATHAN C HERZOG,JOSHUA D GUTTMAN.Strand Spaces:Why is a Security Protocol Correct? [A].Proceedings of the 1998 IEEE Symposium on Security and Privacy [C].IEEE Computer Press,1998.[3] F JAVIER THAYER FABREGA,JONATHAN C HERZOG,JOSHUA D GUTTMAN.Strand Spaces:Proving Security Protocols Correct [J].Journal of Computer Security,1999,(2,3):191-230.[4] FIAT A,SHAMIR A.How to Prove Yourself:Practical Solutions to Identification and Signature Probems [J].Presented at the International Congress of Mathematicians,ICM 86,Berkeley,Californian,U.S.A.,2005.[5] FEIGE U,FIAT A,SHAMIR A.Zero Knowledge Proofs of Identity [A].Proceedings of the Nineteenth ACM Symp. Theory of Computing,STOC [C].New York:ACM Press,2006.[6] SHAMIR A.Interactive Identification [C].Presented at the Workshopo on Algorithms,Randomness and Complexity,Centre International de Rencontres Mathematiques (CIRM),Luminy (Marseille),France,1986.[7] STEINER M,TSUDIK G,WAIDNER M.Refinement and Extension of Encrypted Key Exchange [J].Operrating Syatems Review,1995,29(3):22-30.