2019
DOI: 10.1109/access.2019.2915645
|View full text |Cite
|
Sign up to set email alerts
|

LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols

Abstract: Nowadays, more and more new cryptographic protocols are emerging, and the security analysis of emerging cryptographic protocols is increasingly important. The logic of events is an axiomatic method based on theorem proving, designed around message automation with actions for possible protocol steps; it figured out types of information transmitted in the protocols and also presented novel proof rules and mechanism. However, with the emergence of various cryptographic protocols, the logic of events lacks corresp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 14 publications
(42 reference statements)
0
2
0
Order By: Relevance
“…LoET is based on a message automaton design that defines possible protocol actions, and the analysis process abstracts the interaction actions between honest subjects into different types of events, defines the interaction of the protocol formally as a basic sequence using an event language, and proves the security properties of the protocol based on LoET axiomatic system reasoning. Logic of events theory and related rules are referred to in the literature [14][15][16][17][18][19], and the related theories involved in this paper are given below.…”
Section: Loet Theorymentioning
confidence: 99%
See 1 more Smart Citation
“…LoET is based on a message automaton design that defines possible protocol actions, and the analysis process abstracts the interaction actions between honest subjects into different types of events, defines the interaction of the protocol formally as a basic sequence using an event language, and proves the security properties of the protocol based on LoET axiomatic system reasoning. Logic of events theory and related rules are referred to in the literature [14][15][16][17][18][19], and the related theories involved in this paper are given below.…”
Section: Loet Theorymentioning
confidence: 99%
“…In 2009, Meihua Xiao, in collaboration with the proponents of the logic of events theory, addressed the shortcomings of PCL [15] (Protocol Composition Logic), and he applied LoET to analyse security protocols [16]. In recent years, Prof. Meihua Xiao has led a team to extend LoET to formally analyse the security of security protocols in several different domains [17][18][19]. However, the existing LoET also has limitations: for some authentication protocols with complex cryptographic schemes, the event logic theory cannot perform a formal analysis of them.…”
Section: Introductionmentioning
confidence: 99%