The Verifiability of Two-Party Protocols

  • Ronald V. Book
  • Friedrich Otto
Part of the Lecture Notes in Computer Science book series (LNCS, volume 219)


Public key encryption as used in network communication has been investigated extensively. The main advantage of the techniques developed in this a rea is the potential for secure communication. However, while public key systems are often effective in preventing a passive saboteur from deciphering an intercepted message, protocols must be designed to be secure when dealing with saboteurs who can impersonate users or send copies of intercepted messages on the public channel. Dolev and Yao [3] have shown how informal arguments about protocols can lead to erroneous conclusions, and they have developed formal models of two-party protocols, both cascade protocols and name-stamp protocols. Recall that a protocol is a set of rules that specify what operators a pair of users, the sender and the receiver, need to apply in an exchange of messages for the purpose of transmitting a given plaintext message from the sender to the receiver. In terms of their models, Dolev and Yao developed an elegant characterization of cascade protocols that are secure, a characterization with conditions that can be checked by inspection.


  1. 1.
    R.V. Book and F. Otto, On the security of name-stamp protocols, Theoret. Comput. Sci. 40 (1985), to appear.Google Scholar
  2. 2.
    W. Diffie and M. Hellman, New directions in cryptography, IEEE Trans. Information Theory IT-22 (1976), 644–654.CrossRefMathSciNetGoogle Scholar
  3. 3.
    D. Dolev and A. Yao, On the security of public key protocols, IEEE Trans. Information Theory IT-29 (1983), 198–208. An extended abstract appears in Proc. 22nd IEEE Symp. Foundations of Computer Science (1981), 350–357.CrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1986

Authors and Affiliations

  • Ronald V. Book
    • 1
  • Friedrich Otto
    • 2
  1. 1.Department of MathematicsUniversity of CaliforniaSanta BarbaraUSA
  2. 2.Fachbereich InformatikUniversität KaiserslauternKaiserslauternWest Germany

Personalised recommendations