loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Simone Lupetti ; Feike W. Dillema and Tage Stabell-Kulø

Affiliation: University of Tromsø, Norway

Abstract: This paper discusses the security properties of names. To fulfill their role in cryptographic protocols, names must be unique across correlated sessions i.e. where the massages of one session can be reused in another without detection and that uniqueness must be guaranteed to hold for each participant of these runs. To provide and verify uniqueness, two different mechanisms are shown possible, namely local and global verification. In both cases we discuss the implications of uniqueness on the execution environment of a cryptographic protocol, pointing out the inescapable issues related to each of the two mechanisms. We argue that such implications should be given careful consideration as they represent important elements in the evaluation of a cryptographic protocol itself.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.94.99.173

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Lupetti, S.; W. Dillema, F. and Stabell-Kulø, T. (2006). Names in Cryptographic Protocols. In Proceedings of the 4th International Workshop on Security in Information Systems (ICEIS 2006) - WOSIS; ISBN 978-972-8865-52-8, SciTePress, pages 185-194. DOI: 10.5220/0002484701850194

@conference{wosis06,
author={Simone Lupetti. and Feike {W. Dillema}. and Tage Stabell{-}Kulø.},
title={Names in Cryptographic Protocols},
booktitle={Proceedings of the 4th International Workshop on Security in Information Systems (ICEIS 2006) - WOSIS},
year={2006},
pages={185-194},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002484701850194},
isbn={978-972-8865-52-8},
}

TY - CONF

JO - Proceedings of the 4th International Workshop on Security in Information Systems (ICEIS 2006) - WOSIS
TI - Names in Cryptographic Protocols
SN - 978-972-8865-52-8
AU - Lupetti, S.
AU - W. Dillema, F.
AU - Stabell-Kulø, T.
PY - 2006
SP - 185
EP - 194
DO - 10.5220/0002484701850194
PB - SciTePress