Analyzing Delegation Properties

  • Giampaolo Bella
  • Lawrence C. Paulson
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2845)


Previous work on proving non-repudiation properties using the Inductive Method seems to be reusable for proving delegation properties. Current experiments with Crispo’s delegation protocol support this claim. It follows that the two properties are closely related, though they are used in different contexts to convey different guarantees. It is expected that one man-month is required to develop full machine proofs.


Security Protocol Proof Strategy False Claim Delegation Token Protocol Session 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bella, G.: Modelling Agents’ Knowledge Inductively. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 85–94. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  2. 2.
    Bella, G., Paulson, L.C.: A Proof of Non-Repudiation. In: Proc. of the 9th International Workshop on Security Protocols. LNCS Series. Springer, Heidelberg (2001) (in Press)Google Scholar
  3. 3.
    Bella, G., Paulson, L.C.: Mechanical Proofs about a Non-Repudiation Protocol. In: Boulton, R.J., Jackson, P.B. (eds.) TPHOLs 2001. LNCS, vol. 2152, pp. 91–104. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  4. 4.
    Crispo, B.: Delegation Protocols for Electronic Commerce. In: Proc. of the 6th Symposium on Computers and Communications (ISCC 2001). IEEE Press, Los Alamitos (2001)Google Scholar
  5. 5.
    Crispo, B., Ruffo, G.: Reasoning about Accountability within Delegation. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, p. 251. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  6. 6.
    Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security 6, 85–128 (1998)Google Scholar
  7. 7.
    Zhou, J., Gollmann, D.: A Fair Non-Repudiation Protocol. In: Proc. of the 15th IEEE Symposium on Security and Privacy, pp. 55–61. IEEE Press, Los Alamitos (1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Giampaolo Bella
    • 1
    • 2
  • Lawrence C. Paulson
    • 1
  1. 1.Computer LaboratoryUniversity of CambridgeCambridge(UK)
  2. 2.Dipartimento di Matematica e InformaticaUniversità di CataniaCatania(Italy)

Personalised recommendations