On the verifiability of two-party algebraic protocols (Q1083426)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: On the verifiability of two-party algebraic protocols |
scientific article; zbMATH DE number 3974887
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | On the verifiability of two-party algebraic protocols |
scientific article; zbMATH DE number 3974887 |
Statements
On the verifiability of two-party algebraic protocols (English)
0 references
1985
0 references
Two-party communication protocols for public-key cryptosystems are studied. The formal models are based on the definitions given by \textit{D. Dolev} and \textit{A. Yao} [IEEE Trans. Inf. Theory IT-29, 198-208 (1983; Zbl 0502.94005)]. While the main concern of Dolev and Yao was security, the subject of the present paper is the 'verifiability' of protocols. If a protocol is both sender-verifiable and receiver-verifiable, then either participant can detect when a false or altered message has been injected into the system and can refuse to respond to such a message. Hence, the power of a saboteur can be severely limited if at each stage the participants refuse to continue the exchange unless the last message received complies with the protocol. This means that the message authentication problem of \textit{W. Diffie} and \textit{M. Hellman} [Proc. IEEE 67, 397-427 (1979)] can be solved. To formally describe the notion of verifiabiality, 'sender-verification sequences' and 'receiver-verification sequences' are introduced; if a protocol has a strong sender-verification (receiver-verification) sequence, then there is a simple algorithm that the sender (resp., receiver) can use to determine at each state whether the last message received complies with the protocol. The main results are characterization theorems for both symmetric cascade protocols and symmetric name-stamp protocols that have strong sender-verification sequences or strong receiver-verification sequences. In addition, characterization theorems for nonsymmetric cascade protocols and non- symmetric name-stamp protocols that have verification sequences that are not necessarily strong are developed.
0 references
Two-party communication protocols for public-key cryptosystems
0 references
message authentication problem
0 references
symmetric cascade protocols
0 references
symmetric name-stamp protocols
0 references
sender-verification sequences
0 references
receiver-verification sequences
0 references
nonsymmetric cascade protocols
0 references
non-symmetric name-stamp protocols
0 references