06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

B.8 Application Binding Protocol Distributed<br />

#Functions<br />

symbolic VKey, SKey, EKey, DKey<br />

#Intruder In<strong>for</strong>mation<br />

Intruder = MAppl<br />

IntruderKnowledge = {SerPro, TruPlaMan, MAppl, MAppl, Nm, DKey(MAppl) ,SKey(MAppl),<br />

VKey, EKey, M}<br />

#Specification<br />

StrongSecret(SP, sessionKey, [TPM])<br />

Aliveness(SP, TPM)<br />

Aliveness(TPM, SP)<br />

Agreement(SP, TPM, [sessionKey])<br />

Agreement(TPM, SP, [sessionKey])<br />

#Equivalences<br />

<strong>for</strong>all x, y : Num . Exp(Exp(Gen, x), y) = Exp(Exp (Gen, y), x)<br />

251

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!