Introduction : Alice doesn't live here anymore (transcript)
Hello everyone and welcome to the 19th Security Protocols Workshop. The theme this year, which it is traditional to mention in the first session (and then never refer to again), is "Alice doesn't live here anymore". One of the perennial problems in analysing security protocols is how we distinguish Alice from not-Alice. The prevailing wisdom is that Alice possesses something which not-Alice does not. It might be knowledge of something that is used as a key. It might be that Alice possesses some physical characteristic, such as a biometric, or that there is something about the hardware that Alice is running on that is difficult to replicate. Or it might be that Alice possesses exclusive access to the interface to some distinguishing piece of hardware, like a dongle, although such hardware (when we think about it) usually belongs to some other security domain anyway.