scyther/protocols/misc/compositionality-examples/th-2.spdl
2012-06-12 23:12:14 +02:00

37 lines
503 B
Plaintext

const pk: Function;
secret sk: Function;
inversekeys (pk,sk);
const P2;
protocol nsl3th2(I,R)
{
role I
{
fresh ni: Nonce;
var nr: Nonce;
send_1(I,R, {P2,I,ni}pk(R) );
recv_1b(R,I, {nr}pk(I) );
recv_2(R,I, {P2,ni,nr,R}pk(I) );
send_3(I,R, {P2,nr}pk(R) );
claim_i(I,Nisynch);
}
role R
{
var ni: Nonce;
fresh nr: Nonce;
recv_1(I,R, {P2,I,ni}pk(R) );
send_1b(R,I, {nr}pk(I) );
send_2(R,I, {P2,ni,nr,R}pk(I) );
recv_3(I,R, {P2,nr}pk(R) );
claim_r(R,Nisynch);
}
}