Simulation based security in the applied pi calculus

Stéphanie Delaune, Steve Kremer & Olivier Pereira
We present a symbolic framework for refinement and composition of security protocols. The framework uses the notion of ideal functionalities. These are abstract systems which are secure by construction and which can be combined into larger systems. They can be separately refined in order to obtain concrete protocols implementing them. Our work builds on ideas from the ``trusted party paradigm'' used in computational cryptography models. The underlying language we use is the applied pi calculus...
This data repository is not currently reporting usage information. For information on how your repository can submit usage information, please see our documentation.