Title :
Posets and protocols-picking the right three-party protocol
Author_Institution :
Inf. Security Group, Univ. of London, Egham, UK
fDate :
1/1/2003 12:00:00 AM
Abstract :
In this paper, we introduce a framework in which we can investigate the possibility of adapting a security protocol in order to obtain optimal efficiency according to the communication channels available. This method is based on the observation that there is a partial order imposed upon the actions of the various parties involved in a protocol. We define operations permitted on the partially ordered set associated with the protocol and obtain transformations of the original protocol while preserving the security properties. Performing these operations on the protocol we enumerate the options available to a system.
Keywords :
client-server systems; message authentication; protocols; telecommunication security; authentication protocols; communication channels; optimal efficiency; partial order; partially ordered set; security protocol; strand space model; three-party protocol; transformations; Authentication; Communication channels; Communication system security; Helium; Information security; Message service; Protocols;
Journal_Title :
Selected Areas in Communications, IEEE Journal on
DOI :
10.1109/JSAC.2002.806126