%0 Journal Article %T Research on how to reconcile two views of security protocols''''analysis
调和安全协议两种分析方法的理论研究 %A ZHU Yu-na %A WANG Ya-di %A HAN Ji-hong %A FAN Yu-dan %A
朱玉娜 %A 王亚弟 %A 韩继红 %A 范钰丹 %J 计算机应用研究 %D 2008 %I %X The formal methods of security protocol was categorized as two classes: the symbol approach, and the computational approach. The first relies on a simple but effective formal approach; the latter, on a detailed computational model that considers issues of complexity and probability. Each approach had flaws and virtues. There was an uncomfortable and interesting gap between these two approaches to cryptography. How to bridge the gap by drawing virtues from both approach and discarding their flaw was the new challenge. This paper described the most popular methods, analyzed the current status, as well as pointed out the tendency of them. %K security protocol %K symbol approach %K computational approach %K cryptographic soundness
安全协议 %K 符号方法 %K 计算方法 %K 密码学可靠性 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=A9D9BE08CDC44144BE8B5685705D3AED&aid=9388735258DE90122669E42F8B8E4434&yid=67289AFF6305E306&vid=C5154311167311FE&iid=38B194292C032A66&sid=8587C7CAA7A3D0DB&eid=3C5A0072CBF0FE42&journal_id=1001-3695&journal_name=计算机应用研究&referenced_num=0&reference_num=24