Collusion analysis of cryptographic protocols

被引:0
|
作者
Low, SH
Maxemchuk, NF
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As network applications such as electronic commerce proliferate, complex communications protocols that employ cryptographic building blocks, such as encryption and authentication, will become more common. We view a cryptographic protocol as a process by which information is transferred among some users and hidden from others. The collusion problem determines whether a subset of users can discover, through collusion, the information that is designed to be hidden from them after a protocol is executed. Earlier we introduced a model for cryptographic protocols and its collusion analysis, and solved a special case of tile collusion problem. In this paper we present an algorithm that solves the general case.
引用
收藏
页码:1 / 5
页数:5
相关论文
共 50 条
  • [21] On Formal Analysis of Cryptographic Protocols and Supporting Tool
    Xiao Meihua
    Jiang Yun
    Liu Qiaowei
    CHINESE JOURNAL OF ELECTRONICS, 2010, 19 (02): : 223 - 228
  • [22] Honest functions and their application to the analysis of cryptographic protocols
    Maneki, AP
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 83 - 89
  • [23] Stateless Cryptographic Protocols
    Goyal, Vipul
    Maji, Hemanta K.
    2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 678 - 687
  • [24] Cryptography and cryptographic protocols
    Goldreich, O
    DISTRIBUTED COMPUTING, 2003, 16 (2-3) : 177 - 199
  • [25] Programming cryptographic protocols
    Guttman, JD
    Herzog, JC
    Ramsdell, JD
    Sniffen, BT
    TRUSTWORTHY GLOBAL COMPUTING, 2005, 3705 : 116 - 145
  • [26] Cryptography and cryptographic protocols
    Oded Goldreich
    Distributed Computing, 2003, 16 : 177 - 199
  • [27] A formal analysis for capturing replay attacks in cryptographic protocols
    Gao, Han
    Bodei, Chiara
    Degano, Pierpaolo
    Nielson, Hanne Riis
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
  • [28] Process algebraic frameworks for the specification and analysis of cryptographic protocols
    Gorrieri, R
    Martinelli, F
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2003, PROCEEDINGS, 2003, 2747 : 46 - 67
  • [29] Adversarial Security Analysis of Cryptographic Protocols for IoD Networks
    Samanth, Snehal
    Prema, K. V.
    Balachandra, Mamatha
    IEEE ACCESS, 2024, 12 : 183792 - 183808
  • [30] Decision procedures for the analysis of cryptographic protocols by logics of belief
    Monniaux, D
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 44 - 54