메뉴 건너뛰기




Volumn 5913 LNCS, Issue , 2009, Pages 137-146

A Dolev-Yao model for zero knowledge

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC PROTOCOLS; DECISION PROCEDURE; DOLEV-YAO MODEL; PROOF SYSTEM; SYMBOLIC REASONING; ZERO KNOWLEDGE; ZERO KNOWLEDGE PROOF;

EID: 76549112304     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10622-4_11     Document Type: Conference Paper
Times cited : (2)

References (20)
  • 1
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • AR02
    • [AR02] Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2), 103-127 (2002)
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 4
    • 50249164303 scopus 로고    scopus 로고
    • Zero-Knowledge in the Applied Picalculus and Automated Verification of the Direct Anonymous Attestation Protocol
    • BMU08
    • [BMU08] Backes, M., Maffei, M., Unruh, D.: Zero-Knowledge in the Applied Picalculus and Automated Verification of the Direct Anonymous Attestation Protocol. In: IEEE Symposium on Security and Privacy, pp. 202-215 (2008)
    • (2008) IEEE Symposium on Security and Privacy , pp. 202-215
    • Backes, M.1    Maffei, M.2    Unruh, D.3
  • 5
    • 76549118061 scopus 로고    scopus 로고
    • A Dolev-Yao model for Zero Knowledge
    • BRS09
    • [BRS09] Baskar, A., Ramanujam, R., Suresh, S.P.: A Dolev-Yao model for Zero Knowledge. CMI Technical Report (2009), http://www.cmi.ac.in/~spsuresh/ content/pdffiles/zero-know-jun09.pdf
    • (2009) CMI Technical Report
    • Baskar, A.1    Ramanujam, R.2    Suresh, S.P.3
  • 7
    • 31744441853 scopus 로고    scopus 로고
    • A survey of algebraic properties used in cryptographic protocols
    • CDL06
    • [CDL06] Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security 14(1), 1-43 (2006)
    • (2006) Journal of Computer Security , vol.14 , Issue.1 , pp. 1-43
    • Cortier, V.1    Delaune, S.2    Lafourcade, P.3
  • 8
    • 84962447835 scopus 로고    scopus 로고
    • Computationally sound symbolic secrecy in the presence of hash functions
    • CKKW06, Arun-Kumar, S, Garg, N, eds, FSTTCS 2006, Springer, Heidelberg
    • [CKKW06] Cortier, V., Kremer, S., Küsters, R., Warinschi, B.: Computationally sound symbolic secrecy in the presence of hash functions. In: Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. LNCS, vol. 4337, pp. 176-187. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4337 , pp. 176-187
    • Cortier, V.1    Kremer, S.2    Küsters, R.3    Warinschi, B.4
  • 10
    • 0042467908 scopus 로고    scopus 로고
    • [CLS03] Comon-Lundh, H., Shmatikov, V.: Intruder Deductions, Constraint Solving and Insecurity Decisions in Presence of Exclusive or. In: Proceedings of the 18th IEEE Synposium on Logic in Computer Science (LICS), June 2003, pp. 271-280 (2003)
    • [CLS03] Comon-Lundh, H., Shmatikov, V.: Intruder Deductions, Constraint Solving and Insecurity Decisions in Presence of Exclusive or. In: Proceedings of the 18th IEEE Synposium on Logic in Computer Science (LICS), June 2003, pp. 271-280 (2003)
  • 11
    • 48949088211 scopus 로고    scopus 로고
    • [Cre08] Cremers, C.J.F.: The Scyther Tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, 5123, pp. 414-418. Springer, Heidelberg (2008)
    • [Cre08] Cremers, C.J.F.: The Scyther Tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414-418. Springer, Heidelberg (2008)
  • 12
    • 68249084846 scopus 로고    scopus 로고
    • Verifying privacy-type properties of electronic voting protocols
    • DKR09
    • [DKR09] Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security 17(4), 435-487 (2009)
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 435-487
    • Delaune, S.1    Kremer, S.2    Ryan, M.D.3
  • 14
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • GMR89
    • [GMR89] Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal of Computing 18(1), 186-208 (1989)
    • (1989) SIAM Journal of Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 15
    • 18544364489 scopus 로고    scopus 로고
    • A computational interpretation of dolev-yao adversaries
    • Her05
    • [Her05] Herzog, J.: A computational interpretation of dolev-yao adversaries. Theoretical Computer Science 340(1), 57-81 (2005)
    • (2005) Theoretical Computer Science , vol.340 , Issue.1 , pp. 57-81
    • Herzog, J.1
  • 16
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public key protocol using FDR
    • Low96, Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
    • [Low96] Lowe, G.: Breaking and fixing the Needham-Schroeder public key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 18
    • 11944251803 scopus 로고    scopus 로고
    • Decidability of context-explicit security protocols
    • RS05
    • [RS05] Ramanujam, R., Suresh, S.P.: Decidability of context-explicit security protocols. Journal of Computer Security 13(1), 135-165 (2005)
    • (2005) Journal of Computer Security , vol.13 , Issue.1 , pp. 135-165
    • Ramanujam, R.1    Suresh, S.P.2
  • 19
    • 33751045375 scopus 로고    scopus 로고
    • A (restricted) quantifier elimination for security protocols
    • RS06
    • [RS06] Ramanujam, R., Suresh, S.P.: A (restricted) quantifier elimination for security protocols. Theoretical Computer Science 367, 228-256 (2006)
    • (2006) Theoretical Computer Science , vol.367 , pp. 228-256
    • Ramanujam, R.1    Suresh, S.P.2
  • 20
    • 0037453396 scopus 로고    scopus 로고
    • Protocol Insecurity with Finite Number of Sessions and Composed Keys is NP-complete
    • RT03
    • [RT03] Rusinowitch, M., Turuani, M.: Protocol Insecurity with Finite Number of Sessions and Composed Keys is NP-complete. Theoretical Computer Science 299, 451-475 (2003)
    • (2003) Theoretical Computer Science , vol.299 , pp. 451-475
    • Rusinowitch, M.1    Turuani, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.