Collusion analysis of cryptographic protocols

被引:0
|
作者
Low, SH
Maxemchuk, NF
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As network applications such as electronic commerce proliferate, complex communications protocols that employ cryptographic building blocks, such as encryption and authentication, will become more common. We view a cryptographic protocol as a process by which information is transferred among some users and hidden from others. The collusion problem determines whether a subset of users can discover, through collusion, the information that is designed to be hidden from them after a protocol is executed. Earlier we introduced a model for cryptographic protocols and its collusion analysis, and solved a special case of tile collusion problem. In this paper we present an algorithm that solves the general case.
引用
收藏
页码:1 / 5
页数:5
相关论文
共 50 条
  • [41] Distance bounding protocols: Authentication logic analysis and collusion attacks
    Meadows, Catherine
    Poovendran, Radha
    Pavlovic, Dusko
    Chang, LiWu
    Syverson, Paul
    SECURE LOCALIZATION AND TIME SYNCHRONIZATION FOR WIRELESS SENSOR AND AD HOC NETWORKS, 2007, 30 : 279 - +
  • [42] Provable security for cryptographic protocols - Exact analysis and engineering applications
    Gray, JW
    Ip, KFE
    Lui, KS
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
  • [43] Automatic verification of cryptographic protocols through compositional analysis techniques
    Marchignoli, D
    Martinelli, F
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 1999, 1579 : 148 - 162
  • [44] Non-interference proof techniques for the analysis of cryptographic protocols
    Bugliesi, Michele
    Rossi, Sabina
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (01) : 87 - 113
  • [45] Special Issue on Cryptographic Protocols
    Vogt, Andreas
    CRYPTOGRAPHY, 2018, 2 (03)
  • [46] A bisimulation method for cryptographic protocols
    Abadi, M
    Gordon, AD
    PROGRAMMING LANGUAGES AND SYSTEMS, 1998, 1381 : 12 - 26
  • [47] Sequential rationality in cryptographic protocols
    Gradwohl, Ronen
    Livne, Noam
    Rosen, Alon
    ACM Transactions on Economics and Computation, 2013, 1 (01)
  • [48] Secure Composition of Cryptographic Protocols
    Goyal, Vipul
    PROVABLE SECURITY, 2011, 6980 : 2 - 2
  • [49] Searching for shapes in cryptographic protocols
    Doghmi, Shaddin F.
    Guttman, Joshua D.
    Thayer, F. Javier
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2007, 4424 : 523 - 537
  • [50] A rational approach to cryptographic protocols
    Caballero-Gil, P.
    Henandez-Goya, C.
    Bruno-Castaneda, C.
    MATHEMATICAL AND COMPUTER MODELLING, 2007, 46 (1-2) : 80 - 87