A rational approach to cryptographic protocols

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Rational Approach to Cryptographic Protocols

This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of twoparty cryptographic protocols are here combined in order to model the latters as the formers. One of the main ...

متن کامل

The Coinductive Approach to Verifying Cryptographic Protocols

We look at a new way of specifying and verifying cryptographic protocols using the Coalgebraic Class Specification Language. Protocols are specified into CCSL (with temporal operators for “free”) and translated by the CCSL compiler into theories for the theorem prover PVS. Within PVS, the desired security conditions can then be (dis)proved. In addition, we are interested in using assumptions wh...

متن کامل

The Inductive Approach to Verifying Cryptographic Protocols

Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can be as little as a week or two, yielding a proof script that takes a few minutes to run. Protocols are i...

متن کامل

Introduction to Cryptographic Protocols

1 : x||y String x is concatenated with string y. 2 : λ(C) Distribution of a given instance or random variable C. 3 : D(X, Y) Statistical distance between the distributions of the two random variables X and Y. 6 : = Stat Statistical indistinguishability between two Random Variables: see Definition 8. 7 : = Comp Computational indistinguishability between two Random Variables: see Definition 9. 8 ...

متن کامل

Cryptographic Protocols to Prevent Spam

Email's main (and initial) use is professional and personal communication. Email is very efficient, convenient and low-cost, especially when automatically sent by programs to many recipients ('bulk email'). Therefore, email is also used to distribute other messages: from unsolicited offerings and ads, to malicious content such as viruses and scams. Users are rarely interested in these messages;...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematical and Computer Modelling

سال: 2007

ISSN: 0895-7177

DOI: 10.1016/j.mcm.2006.12.013