Skip to main content
Top

1983 | OriginalPaper | Chapter

On the Security of Ping-Pong Protocols

Authors : D. Dolev, S. Even, R. M. Karp

Published in: Advances in Cryptology

Publisher: Springer US

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Consider the class of protocols, for two participants, in which the initiator applies a sequence of operators to a message M and sends it to the other participant; in each step, one of the participants applies a sequence of operators to the message received last, and sends it back. This “ping-pong” action continues several times, using sequences of operators as specified by the protocol. The set of operators may include public-key encryptions and decryptions.We present an O(n3) algorithm which determines the security of a given protocol (of length n). This is an improvement of the algorithm of Dolev and Yao [DY].

Metadata
Title
On the Security of Ping-Pong Protocols
Authors
D. Dolev
S. Even
R. M. Karp
Copyright Year
1983
Publisher
Springer US
DOI
https://doi.org/10.1007/978-1-4757-0602-4_16

Premium Partner