5.4. Protocol specifications
Casper supports a number of different forms of specification for protocols, some of which we have seen before. The complete list is as follows:
Secret(A, s, [B1, ... ,Bn]) specifies that in any completed run A can expect the value of the variable s to be a secret; B1,... ,Bn are the variables representing the roles with whom the secret is shared. This specification fails if A can complete a run, where none of the roles B1,... ,Bn is legitimately taken by the intruder, but the intruder learns the value A gives to s.
StrongSecret(A, s, [B1,... ,Bn]) is similar to Secret(A, s, [B1,... ,Bn]), except it also includes incomplete runs. Thus, this specification fails if A can take part in a run – complete or not – where none ...
Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.