An Experiment in Ping-Pong Protocol Verification by Nondeterministic Pushdown Automata

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Experiment in Ping-Pong Protocol Verification by Nondeterministic Pushdown Automata

An experiment is described that confirms the security of a well-studied class of cryptographic protocols (Dolev-Yao intruder model) can be verified by two-way nondeterministic pushdown automata (2NPDA). A nondeterministic pushdown program checks whether the intersection of a regular language (the protocol to verify) and a given Dyck language containing all canceling words is empty. If it is not...

متن کامل

Attack the ‘ping-pong’ protocol without eavesdropping

Qing-yu Cai Wuhan Institute of Physics and Mathematics, The Chinese Academy of Sciences, Wuhan, 430071, People’s Republic of China Bostr .. om and Felbinger [1] have presented a ping-pong communication protocol which allows the information transferred in a deterministic secure manner. The security of this ping-pong protocol is based on an entangled pair of qubits. And the proof of the case of e...

متن کامل

Verification of Multi-Party Ping-Pong Protocols via Program Transformation

The paper describes a verification technique based on program transformation with unfolding. The technique allows to find short attacks on multi-party ping-pong protocols in the Dolev–Yao intruder model. Protocols are modelled by prefix grammars, and questions of model optimization and complexity are considered. Examples of model programs for protocols were written in a functional language and ...

متن کامل

On the Security of Quantum Key Distribution Ping-Pong Protocol

Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but...

متن کامل

Improving the capacity of the ping-pong protocol

Since Bennett and Brassard presented the pioneer quantum key distribution (QKD) protocol in 1984 [1], there are a lot of theoretical QKD schemes [1-12] today. Recently, Beige et al. proposed a quantum secure direct communication scheme [13], which allows messages communicated directly without first establishing a random key to encrypt them. Bostroem and Felbingeer presented a ping-pong protocol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronic Proceedings in Theoretical Computer Science

سال: 2018

ISSN: 2075-2180

DOI: 10.4204/eptcs.268.6