正在加载图片...
objectives of identification protocols If Alice and Bob are both honest, a is able to successfully authenticate herself to Bob, i.e. Bob will complete the protocol having accepted Alice's identity. Bob cannot reuse an identification exchange with Alice so as to impersonate her in conversations with others The probability that Eve can successfully impersonate Alice to Bob is negligible(e. g. computationally difficult) All the above remain true even if Eve has seen many previous authentication sessions between Alice and Bob, has had experience in authenticating herself with both, and multiple authentication sessions are run simultaneously.5 objectives of identification protocols • If Alice and Bob are both honest, A is able to successfully authenticate herself to Bob, i.e. Bob will complete the protocol having accepted Alice’s identity. • Bob cannot reuse an identification exchange with Alice so as to impersonate her in conversations with others. • The probability that Eve can successfully impersonate Alice to Bob is negligible (e.g. computationally difficult). • All the above remain true even if Eve has seen many previous authentication sessions between Alice and Bob, has had experience in authenticating herself with both, and multiple authentication sessions are run simultaneously
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有