Collusion analysis of cryptographic protocols

被引:0
|
作者
Low, SH
Maxemchuk, NF
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As network applications such as electronic commerce proliferate, complex communications protocols that employ cryptographic building blocks, such as encryption and authentication, will become more common. We view a cryptographic protocol as a process by which information is transferred among some users and hidden from others. The collusion problem determines whether a subset of users can discover, through collusion, the information that is designed to be hidden from them after a protocol is executed. Earlier we introduced a model for cryptographic protocols and its collusion analysis, and solved a special case of tile collusion problem. In this paper we present an algorithm that solves the general case.
引用
收藏
页码:1 / 5
页数:5
相关论文
共 50 条
  • [31] A survey on computationally sound formal analysis of cryptographic protocols
    Lei, Xin-Feng
    Song, Shu-Min
    Liu, Wei-Bing
    Xue, Rui
    Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (05): : 993 - 1016
  • [32] Decidable analysis of cryptographic protocols with products and modular exponentiation
    Shmatikov, V
    PROGRAMMING LANGUAGES AND SYSTEMS, 2004, 2986 : 355 - 369
  • [33] Automated analysis of cryptographic protocols using Mur phi
    Mitchell, JC
    Mitchell, M
    Stern, U
    1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 141 - 151
  • [34] Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings
    Pankova, Alisa
    Laud, Peeter
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 63 - 77
  • [35] Tools for cryptographic protocols analysis: A technical and experimental comparison
    Cheminod, Manuel
    Bertolotti, Ivan Cibrario
    Durante, Luca
    Sisto, Riccardo
    Valenzano, Adriano
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 954 - 961
  • [36] A problem solving mechanism for formal analysis of cryptographic Protocols
    Han, Jihong
    Zhao, Yu
    Wang, Yadi
    Zhou, Zhiyong
    NEW ADVANCES IN SIMULATION, MODELLING AND OPTIMIZATION (SMO '07), 2007, : 95 - 98
  • [37] Automata-based analysis of recursive cryptographic protocols
    Küsters, R
    Wilke, T
    STACS 2004, PROCEEDINGS, 2004, 2996 : 382 - 393
  • [38] Logic-based formal analysis of cryptographic protocols
    Muhammad, Shahabuddin
    Furqan, Zeeshan
    Guha, Ratan K.
    ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 300 - +
  • [39] Decision procedures for the analysis of cryptographic protocols by logics of belief
    Monniaux, David
    Proceedings of the Computer Security Foundations Workshop, 1999, : 44 - 54
  • [40] Collusion Resistant Watermarking Schemes for Cryptographic Functionalities
    Yang, Rupeng
    Au, Man Ho
    Lai, Junzuo
    Xu, Qiuliang
    Yu, Zuoxia
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I, 2019, 11921 : 371 - 398