Resource Fairness and Composability of Cryptographic Protocols

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Compiling and securing cryptographic protocols

Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequences of operations to be performed by each role. Unlike previous works, we reduce this compilation process to well-known decision problems in formal protocol analysis. This allows one to define a natural notion of prudent ...

متن کامل

Programming Cryptographic Protocols

Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principals engaging in it. Moreover, trust management assertions may be attached to protocol actions, constraining the behavior of a principal to be compatible with its own trust policy. We embody these ideas in a cryptographic ...

متن کامل

Lecture Notes Cryptographic Protocols

ii iii Preface In this course, we focus on asymmetric techniques for cryptographic protocols, also considering proofs of security for various constructions. Motivating example: 'Sinterklaaslootjes trekken' is a Dutch tradition for buying presents and writing little poems, see, The same tradition is also known as " Secret Santa " , and a lot of websites and programs are available to help people ...

متن کامل

Nonmonotonic Cryptographic Protocols

This paper presents a new method for specifying and analyzing cryptographic protocols. Our method o ers several advantages over previous approaches. Our technique is the rst to allow reasoning about nonmonotonic protocols. These protocols are needed for systems that rely on the deletion of information. There is no idealization step in specifying protocols; we specify at a level that is close to...

متن کامل

Transformations between Cryptographic Protocols

A transformation F between protocols associates the messages sent and received by participants in a protocol Π1 with messages sent and received in some Π2. Transformations are useful for modeling protocol design, protocol composition, and the services that protocols provide. A protocol transformation determines a map from partial behaviors A1 of Π1—which we call “skeletons”—to skeletons F (A1) ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cryptology

سال: 2010

ISSN: 0933-2790,1432-1378

DOI: 10.1007/s00145-010-9080-z