Collusion analysis of cryptographic protocols

被引:0
|
作者
Low, SH
Maxemchuk, NF
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As network applications such as electronic commerce proliferate, complex communications protocols that employ cryptographic building blocks, such as encryption and authentication, will become more common. We view a cryptographic protocol as a process by which information is transferred among some users and hidden from others. The collusion problem determines whether a subset of users can discover, through collusion, the information that is designed to be hidden from them after a protocol is executed. Earlier we introduced a model for cryptographic protocols and its collusion analysis, and solved a special case of tile collusion problem. In this paper we present an algorithm that solves the general case.
引用
收藏
页码:1 / 5
页数:5
相关论文
共 50 条
  • [1] Symbolic trace analysis of cryptographic protocols
    Boreale, M
    [J]. AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681
  • [2] Non interference for the analysis of cryptographic protocols
    Focardi, R
    Gorrieri, R
    Martinelli, F
    [J]. AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 354 - 372
  • [3] Cryptographic Protocols Analysis in Event B
    Benaissa, Nazim
    Mery, Dominique
    [J]. PERSPECTIVES OF SYSTEMS INFORMATICS, 2010, 5947 : 282 - +
  • [4] A Probabilistic Scheduler for the Analysis of Cryptographic Protocols
    Brlek, Srecko
    Hamadou, Sardaouna
    Mullins, John
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 194 (01) : 61 - 83
  • [5] A Performance Analysis Model for Cryptographic Protocols
    Olagunju, Amos
    Soenneker, Jake
    [J]. ICSIT 2011: THE 2ND INTERNATIONAL CONFERENCE ON SOCIETY AND INFORMATION TECHNOLOGIES, 2011, : 80 - 85
  • [6] New analysis method of cryptographic protocols
    Qian, Y.
    Zhang, Y.
    Bai, Y.C.
    [J]. Jisuanji Gongcheng/Computer Engineering, 2001, 27 (03):
  • [7] CVS: a compiler for the analysis of cryptographic protocols
    Durante, A
    Focardi, R
    Gorrieri, R
    [J]. PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 203 - 212
  • [8] Design and analysis of cryptographic protocols for RFID
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    [J]. Jisuanji Xuebao, 2006, 4 (581-589):
  • [9] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    [J]. Science China(Information Sciences), 2004, (02) : 199 - 220
  • [10] Honest functions and their application to the analysis of cryptographic protocols
    Maneki, Alfred P.
    [J]. Proceedings of the Computer Security Foundations Workshop, 1999, : 83 - 89