Secrecy by typing in security protocols

  • Martín Abadi
TACS Open Lecture

DOI: 10.1007/BFb0014571

Volume 1281 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Abadi M. (1997) Secrecy by typing in security protocols. In: Abadi M., Ito T. (eds) Theoretical Aspects of Computer Software. TACS 1997. Lecture Notes in Computer Science, vol 1281. Springer, Berlin, Heidelberg


We develop principles and rules for achieving secrecy properties in security protocols. Our approach is based on traditional classification techniques, and extends those techniques to handle concurrent processes that use shared-key cryptography. The rules have the form of typing rules for a basic concurrent language with cryptographic primitives, the spi calculus. They guarantee that, if a protocol typechecks, then it does not leak its secret inputs.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag 1997

Authors and Affiliations

  • Martín Abadi
    • 1
  1. 1.Digital Equipment CorporationSystems Research CenterUSA