This paper discusses the semantics of authentication protocol, and then proposes a new formal logic system of authentication. It is useful and effective, not only in analyzing key establish protocols, but in analyzing identification authentication protocols, electronic commerce protocols and non-repudiation protocols. And my logic needn't the protocol idealization that has caused many problems in other BAN-like logic systems.
展开▼