Abstract
We present a protocol for multi-party authentication for any number of parties, which generalises the Needham-Schroeder-Lowe protocol. We show that the protocol satisfies injective synchronisation of the communicating parties and secrecy of the generated nonces.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
L. Buttyán, A. Nagy, I. Vajda, Efficient multi-party challenge-response protocols for entity authentication. Period. Polytech. 45(1), 43–64 (2001)
J.A. Clark, J.L. Jacob, A survey of authentication protocol literature: Version 1.0. Unpublished article (1997)
J. Heather, G. Lowe, S. Schneider, How to prevent type flaw attacks on security protocols. J. Comput. Secur. 11(2), 217–244 (2003)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Cremers, C., Mauw, S. (2012). Generalising NSL for Multi-party Authentication. In: Operational Semantics and Verification of Security Protocols. Information Security and Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78636-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-78636-8_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78635-1
Online ISBN: 978-3-540-78636-8
eBook Packages: Computer ScienceComputer Science (R0)