Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

On the Properties of Epistemic and Temporal Epistemic Logics of Authentication

View through CrossRef
The authentication properties of a security protocol are specified based on the knowledge gained by the principals that exchange messages with respect to the steps of that protocol. As there are many successful attacks on authentication protocols, different formal systems, in particular epistemic and temporal epistemic logics, have been developed for analyzing such protocols. However, such logics may fail to detect some attacks. To promote the specification and verification power of these logics, researchers may try to construct them in such a way that they preserve some properties such as soundness, completeness, being omniscience-free, or expressiveness. The aim of this paper is to provide an overview of the epistemic and temporal epistemic logics which are applied in the analysis of authentication protocols to find out how far these logical properties may affect analyzing such protocols.
Title: On the Properties of Epistemic and Temporal Epistemic Logics of Authentication
Description:
The authentication properties of a security protocol are specified based on the knowledge gained by the principals that exchange messages with respect to the steps of that protocol.
As there are many successful attacks on authentication protocols, different formal systems, in particular epistemic and temporal epistemic logics, have been developed for analyzing such protocols.
However, such logics may fail to detect some attacks.
To promote the specification and verification power of these logics, researchers may try to construct them in such a way that they preserve some properties such as soundness, completeness, being omniscience-free, or expressiveness.
The aim of this paper is to provide an overview of the epistemic and temporal epistemic logics which are applied in the analysis of authentication protocols to find out how far these logical properties may affect analyzing such protocols.

Related Results

An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Role of the Frontal Lobes in the Propagation of Mesial Temporal Lobe Seizures
Role of the Frontal Lobes in the Propagation of Mesial Temporal Lobe Seizures
Summary: The depth ictal electroencephalographic (EEG) propagation sequence accompanying 78 complex partial seizures of mesial temporal origin was reviewed in 24 patients (15 from...
Epistemic extensions of substructural inquisitive logics
Epistemic extensions of substructural inquisitive logics
Abstract In this paper, we study the epistemic extensions of distributive substructural inquisitive logics. Substructural inquisitive logics are logics of questions ...
Epistemic Injustice or Epistemic Oppression?
Epistemic Injustice or Epistemic Oppression?
The concepts of epistemic injustice and epistemic oppression both aim to track obstacles to epistemic agencyーi.e., forms of epistemic exclusionーthat are undue and persistent. Indee...
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Abstract Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech i...
Temas Epistêmicos, não Epistêmicos no Ensino
Temas Epistêmicos, não Epistêmicos no Ensino
Resumo A Epistemologia da Ciência é um campo de estudo que permite analisar o desenvolvimento da ciência em uma postura dialética, que qualifica as questões internas à Ciência, rel...

Back to Top