2018
DOI: 10.1007/s41980-018-0087-9
|View full text |Cite
|
Sign up to set email alerts
|

An Omniscience-Free Temporal Logic of Knowledge for Verifying Authentication Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(11 citation statements)
references
References 23 publications
0
11
0
Order By: Relevance
“…The resulting logic is called TWS5. This logic successfully verifies a modified TESLA protocol -called M-TESLAwhich cannot be analyzed by the previous temporal epistemic logics that are not omniscience-free [4]. However, these logics make use of message permutation functions, which cause exponential run time [39].…”
Section: Inside the Logicsmentioning
confidence: 89%
See 4 more Smart Citations
“…The resulting logic is called TWS5. This logic successfully verifies a modified TESLA protocol -called M-TESLAwhich cannot be analyzed by the previous temporal epistemic logics that are not omniscience-free [4]. However, these logics make use of message permutation functions, which cause exponential run time [39].…”
Section: Inside the Logicsmentioning
confidence: 89%
“…The first approach, which makes the resulting temporal epistemic logic very expressive, is the fusion approach where epistemic and temporal modalities may appear in each other's scope without any restrictions. Moreover, the resulting logic may have axioms and rules that explore interactions between time and knowledge [5,8,23,4]. This approach has been used in developing logics applied in analyzing a wide range of security protocols.…”
Section: Expressivenessmentioning
confidence: 99%
See 3 more Smart Citations