메뉴 건너뛰기




Volumn 5789 LNCS, Issue , 2009, Pages 571-586

Computationally sound analysis of a probabilistic contract signing protocol

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL SETTINGS; CONTRACT-SIGNING PROTOCOLS; DELAY MESSAGES; PROBABILISTIC FRAMEWORK; PROTOCOL ANALYSIS; SECURE CHANNELS; SOUND ANALYSIS; TEMPORAL FORMULAE;

EID: 70350366911     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04444-1_35     Document Type: Conference Paper
Times cited : (7)

References (23)
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • AR02
    • [AR02] Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2), 103-127 (2002)
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 4
    • 70350423425 scopus 로고    scopus 로고
    • Computationally sound analysis of a probabilistic contract signing protocol
    • ASW09, Technical Report 0911, Institut für Informatik, Christian-Albrechts-Universität zu Kiel
    • [ASW09] Aizatulin, M., Schnoor, H., Wilke, T.: Computationally sound analysis of a probabilistic contract signing protocol. Technical Report 0911, Institut für Informatik, Christian-Albrechts-Universität zu Kiel (2009)
    • (2009)
    • Aizatulin, M.1    Schnoor, H.2    Wilke, T.3
  • 5
    • 33750447642 scopus 로고    scopus 로고
    • [BDD+06] Backes, M., Datta, A., Derek, A., Mitchell, J.C., Turuani, M.: Compositional analysis of contract-signing protocols. Theoretical Computer Science 367(1-2), 33-56 (2006)
    • [BDD+06] Backes, M., Datta, A., Derek, A., Mitchell, J.C., Turuani, M.: Compositional analysis of contract-signing protocols. Theoretical Computer Science 367(1-2), 33-56 (2006)
  • 8
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • BR93, Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • [BR93] Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 33745528593 scopus 로고    scopus 로고
    • [CH06] Canetti, R., Herzog, J.: Universally composable symbolic analysis of mutual authentication and key-exchange protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 380-403. Springer, Heidelberg (2006)
    • [CH06] Canetti, R., Herzog, J.: Universally composable symbolic analysis of mutual authentication and key-exchange protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 380-403. Springer, Heidelberg (2006)
  • 10
    • 84962447835 scopus 로고    scopus 로고
    • Computationally sound symbolic secrecy in the presence of hash functions
    • CKKW06, Arun-Kumar, S, Garg, N, eds, FSTTCS 2006, Springer, Heidelberg
    • [CKKW06] Cortier, V., Kremer, S., Küsters, R., Warinschi, B.: Computationally sound symbolic secrecy in the presence of hash functions. In: Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. LNCS, vol. 4337, pp. 176-187. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4337 , pp. 176-187
    • Cortier, V.1    Kremer, S.2    Küsters, R.3    Warinschi, B.4
  • 12
    • 38049048838 scopus 로고    scopus 로고
    • A cryptographic model for branching time security properties-the case of contract signing protocols
    • CKW07, Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
    • [CKW07] Cortier, V., Küsters, R., Warinschi, B.: A cryptographic model for branching time security properties-the case of contract signing protocols. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 422-437. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734 , pp. 422-437
    • Cortier, V.1    Küsters, R.2    Warinschi, B.3
  • 13
    • 44049103684 scopus 로고    scopus 로고
    • [CL07] Chen, T., Lu, J.: Probabilistic alternating-time temporal logic and model checking algorithm. In: Lei, J. (ed.) FSKD (2), pp. 35-39. IEEE Computer Society Press, Los Alamitos (2007)
    • [CL07] Chen, T., Lu, J.: Probabilistic alternating-time temporal logic and model checking algorithm. In: Lei, J. (ed.) FSKD (2), pp. 35-39. IEEE Computer Society Press, Los Alamitos (2007)
  • 16
    • 84957060126 scopus 로고    scopus 로고
    • Abuse-free optimistic contract signing
    • GJM99, Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
    • [GJM99] Garay, J.A., Jakobsson, M., MacKenzie, P.D.: Abuse-free optimistic contract signing. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 449-466. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 449-466
    • Garay, J.A.1    Jakobsson, M.2    MacKenzie, P.D.3
  • 17
    • 70350381707 scopus 로고    scopus 로고
    • Infinite state AMC-model checking for cryptographic protocols. In: LICS
    • KKT07, Los Alamitos
    • [KKT07] Kähler, D., Küsters, R., Truderung, T.: Infinite state AMC-model checking for cryptographic protocols. In: LICS, pp. 181-192. IEEE Computer Society Press, Los Alamitos (2007)
    • (2007) IEEE Computer Society Press , pp. 181-192
    • Kähler, D.1    Küsters, R.2    Truderung, T.3
  • 18
    • 24144437134 scopus 로고    scopus 로고
    • Deciding properties of contractsigning protocols
    • KKW05, Diekert, V, Durand, B, eds, STACS 2005, Springer, Heidelberg
    • [KKW05] Kähler, D., Küsters, R., Wilke, T.: Deciding properties of contractsigning protocols. In: Diekert, V., Durand, B. (eds.) STACS 2005. LNCS, vol. 3404, pp. 158-169. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3404 , pp. 158-169
    • Kähler, D.1    Küsters, R.2    Wilke, T.3
  • 20
    • 0037937457 scopus 로고    scopus 로고
    • A game-based verification of non-repudiation and fair exchange protocols
    • KR03
    • [KR03] Kremer, S., Raskin, J.-F.: A game-based verification of non-repudiation and fair exchange protocols. Journal of Computer Security 11(3), 399-430 (2003)
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 399-430
    • Kremer, S.1    Raskin, J.-F.2
  • 21
    • 0000619048 scopus 로고
    • Extensive games and the problem of information
    • Kuh53
    • [Kuh53] Kuhn, H.W.: Extensive games and the problem of information. Annals of Mathematics Studies 28, 193-216 (1953)
    • (1953) Annals of Mathematics Studies , vol.28 , pp. 193-216
    • Kuhn, H.W.1
  • 22
    • 70350431681 scopus 로고    scopus 로고
    • [LM05] Lakhnech, Y., Mazaré, L.: Computationally sound verification of security protocols using Diffie-Hellman exponentiation. Technical report, Verimag (2005)
    • [LM05] Lakhnech, Y., Mazaré, L.: Computationally sound verification of security protocols using Diffie-Hellman exponentiation. Technical report, Verimag (2005)
  • 23
    • 0003960505 scopus 로고    scopus 로고
    • On the impossibility of fair exchange without a trusted third party
    • PG99, Technical report, Darmstadt University of Technology
    • [PG99] Pagnia, H., Gartner, F.C.: On the impossibility of fair exchange without a trusted third party. Technical report, Darmstadt University of Technology (1999)
    • (1999)
    • Pagnia, H.1    Gartner, F.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.