Advanced Search
Volume 31 Issue 2
Dec.  2010
Turn off MathJax
Article Contents
Tie Man-xia, Li Jian-dong, Wang Yu-min. A Correctness Proof of WAPI Key Management Protocol Based on PCL[J]. Journal of Electronics & Information Technology, 2009, 31(2): 444-447. doi: 10.3724/SP.J.1146.2007.01356
Citation: Tie Man-xia, Li Jian-dong, Wang Yu-min. A Correctness Proof of WAPI Key Management Protocol Based on PCL[J]. Journal of Electronics & Information Technology, 2009, 31(2): 444-447. doi: 10.3724/SP.J.1146.2007.01356

A Correctness Proof of WAPI Key Management Protocol Based on PCL

doi: 10.3724/SP.J.1146.2007.01356
  • Received Date: 2007-08-23
  • Rev Recd Date: 2008-02-18
  • Publish Date: 2009-02-19
  • Based on PCL, a formal correctness proof of WAPI key management protocol is presented. First, unicast key negotiation and multicast key announcement sub-protocols are analyzed, and their separate proofs of specific security properties of SSA and KS are detailed under unbounded number of participants and sessions. Second, according to the sequential rule and staged composition theorem, all principals do not execute both roles of ASUE and AE, and the precondition of a sub-protocol is preserved by the other one later in the chain, so, WAPI key management protocol possesses the required security properties and achieves its predefined goals.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3460) PDF downloads(787) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return