Cryptographic security of reactive systems: (Extended abstract)
Birgit Pfitzmann, Matthias Schunter, et al.
Electronic Notes in Theoretical Computer Science
The Liberty-enabled client and proxy (LECP) protocol's profile is discussed. The LECP protocol is essentially a three-party authentication and channel-establishment in the standard setting of protocols such as Needham-Schroeder or Kerberos, in which all three parties run specific protocol engines. The main advantage of channel-based protocols is that they work with secure sockets layer (SSL) or transport-layer security (TLS), the only current ubiquitous cryptographic infrastructure. Several concerns disappear with an enabled client, as in the LECP protocol, if the operational and user-interface aspects are well designed.
Birgit Pfitzmann, Matthias Schunter, et al.
Electronic Notes in Theoretical Computer Science
Mihir Bellare, Juan A. Garay, et al.
USENIX EC 1995
Michael Backes, Birgit Pfitzmann, et al.
CCS 2003
Birgit Pfitzmann, Michael Waidner
ACM Transactions on Computer Systems