Filters








6,701 Hits in 7.8 sec

A New Knowledge Representation Strategy for Cryptographic Protocol Analysis [chapter]

Ivan Cibrario B., Luca Durante, Riccardo Sisto, Adriano Valenzano
<span title="">2003</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The formal verification of security properties of a cryptographic protocol is a difficult, albeit very important task as more and more sensible resources are added to public networks.  ...  We present an intruder's knowledge representation strategy that supports the full term language of spi calculus and does not pose artificial restrictions, such as atomicity or limited maximum size, to  ...  It is a process algebraic language designed for describing and analyzing cryptographic protocols.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-36577-x_21">doi:10.1007/3-540-36577-x_21</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gksa55pmvjg23amwlplu3f77hu">fatcat:gksa55pmvjg23amwlplu3f77hu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180724183202/https://link.springer.com/content/pdf/10.1007%2F3-540-36577-X_21.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/72/5b/725bdd70ea29270ab7d2d4baf411436ccd5552cd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-36577-x_21"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A rational approach to cryptographic protocols

P. Caballero-Gil, C. Henández-Goya, C. Bruno-Castañeda
<span title="">2007</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q5bfnofiffaoldjsebw7gavjjm" style="color: black;">Mathematical and computer modelling</a> </i> &nbsp;
This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible  ...  With those tools, protocols can be studied in a malicious model in order to find equilibrium conditions that make possible to protect honest parties against all possible strategies of adversaries.  ...  cryptographic protocols for secret exchange was provided.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.mcm.2006.12.013">doi:10.1016/j.mcm.2006.12.013</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2guj7tef3fg2pnbwbfmlkl737i">fatcat:2guj7tef3fg2pnbwbfmlkl737i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171004122919/https://core.ac.uk/download/pdf/2120937.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/58/e4/58e488e8a0521d3745792a100d8a9f33adbfd773.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.mcm.2006.12.013"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols [chapter]

Ran Canetti, Jonathan Herzog
<span title="">2006</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We define a mapping from such protocols to Dolev-Yao style symbolic protocols, and show that the symbolic protocol satisfies a certain symbolic criterion if and only if the corresponding cryptographic  ...  Symbolic analysis of cryptographic protocols is dramatically simpler than full-fledged cryptographic analysis. In particular, it is simple enough to be automated.  ...  Acknowledgments We thank Shai Halevi and Akshay Patil for very useful comments and discussions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11681878_20">doi:10.1007/11681878_20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cgkfnymnbzhdbbfjraz54euid4">fatcat:cgkfnymnbzhdbbfjraz54euid4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150423144004/http://www.iacr.org/cryptodb/archive/2006/TCC/3606/3606.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/be/17/be17be1e9504e003553a6610247ada8f88222396.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11681878_20"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Side-Channel Attacks Meet Secure Network Protocols [chapter]

Alex Biryukov, Daniel Dinu, Yann Le Corre
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
A typical input for the AES-CTR and AES-CCM modes used in the IEEE 802.15.4 protocol is shown in Fig. 1.  ...  Side-channel attacks are powerful tools for breaking systems that implement cryptographic algorithms.  ...  We would like to thank the ACNS 2017 reviewers for their valuable feedback and Johann Großschädl for proofreading the final version of this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-61204-1_22">doi:10.1007/978-3-319-61204-1_22</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yzaza3mcujei5aowohyasojski">fatcat:yzaza3mcujei5aowohyasojski</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190911041150/http://orbilu.uni.lu/bitstream/10993/31797/1/ACNS2017.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/56/4c/564cda47c1cac6de4c67a58ebc5e4c9fe3f68ba6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-61204-1_22"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx [chapter]

Paolo Modesti
<span title="">2014</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Our AnBx compiler is a tool for automatic generation of Java code of security protocols specified in the Alice&Bob notation.  ...  Moreover, the tool applies various optimization strategies to achieve efficiency both at compile and run time.  ...  The author wishes to thank Thomas Groß for his helpful discussions and comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-11851-2_17">doi:10.1007/978-3-319-11851-2_17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bhlg7dibhve2feygdypqpclxwq">fatcat:bhlg7dibhve2feygdypqpclxwq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829225156/http://sure.sunderland.ac.uk/6213/1/stm2014.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/92/23/92231b5d52a6d89163ade60ecbb32c97d6e5d768.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-11851-2_17"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Knowledge and Security [article]

Riccardo Pucella
<span title="2013-05-04">2013</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
This survey illustrates some of these uses by focusing on confidentiality in the context of cryptographic protocols, and in the context of multi-level security systems.  ...  Thanks to Aslan Askarov, Philippe Balbiani, Stephen Chong, and Vicky Weissman for comments on an early draft of this chapter.  ...  shifting the approach to cryptographic protocol analysis.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1305.0876v1">arXiv:1305.0876v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2ldo7jcaj5ezpfveemzsim7ihq">fatcat:2ldo7jcaj5ezpfveemzsim7ihq</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-1305.0876/1305.0876.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1305.0876v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Computational Soundness for Dalvik Bytecode

Michael Backes, Robert Künnemann, Esfandiar Mohammadi
<span title="">2016</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS&#39;16</a> </i> &nbsp;
These approaches do not distinguish cryptographic and non-cryptographic operations, and hence do not account for cryptographic protections: f(m) is considered sensitive for a sensitive message m irrespective  ...  In this paper, we show how cryptographic operations can be faithfully included into existing approaches for automated app analysis.  ...  ACKNOWLEDGEMENTS This work has been partially funded by the German Research Foundation (DFG) via the collaborative research center "Methods and Tools for Understanding and Controlling Privacy" (SFB 1223  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2976749.2978418">doi:10.1145/2976749.2978418</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/0001KM16.html">dblp:conf/ccs/0001KM16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jew3ka3x6ravxexg5tup6tci4u">fatcat:jew3ka3x6ravxexg5tup6tci4u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218100554/https://static.aminer.org/pdf/20170130/pdfs/ccs/njaxx8hs0kwzrggbb1m26vz7eflsyuqk.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8f/7c/8f7cab38f1bf8b8e018fbf320975c0f67367a9e0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2976749.2978418"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Verifying Implementations of Security Protocols by Refinement [chapter]

Nadia Polikarpova, Michał Moskal
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We propose a technique for verifying high-level security properties of cryptographic protocol implementations based on stepwise refinement.  ...  Our refinement strategy supports reasoning about abstract protocol descriptions in the symbolic model of cryptography and gradually concretizing them towards executable code.  ...  We are grateful to François Dupressoir, Carlo Furia and Andy Gordon, as well as the anonymous referees, for their comments on the draft versions of this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-27705-4_5">doi:10.1007/978-3-642-27705-4_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gwropnszwngebmle7igo7d2rg4">fatcat:gwropnszwngebmle7igo7d2rg4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20131126042921/http://research.microsoft.com:80/en-us/um/people/moskal/pdf/crypto-refinement.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2e/bd/2ebd1e92d382e818635299f89f2540a97292456c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-27705-4_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification

S Gritzalis, D Spinellis, P Georgiadis
<span title="">1999</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/mnyvgmlsc5a5xi7554ow77exfu" style="color: black;">Computer Communications</a> </i> &nbsp;
The most commonly followed techniques for the application of formal methods for the ex-post analysis and verification of cryptographic protocols, as the analysis approach, are reviewed, followed by the  ...  Modern high-level specification languages and tools can be used for automatically analysing cryptographic protocols.  ...  Mao, Hewlett-Packard, and the anonymous referees for their insightful remarks and constructive comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s0140-3664(99)00030-4">doi:10.1016/s0140-3664(99)00030-4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cv3vmaztf5drxc2edllnfgefva">fatcat:cv3vmaztf5drxc2edllnfgefva</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170830050334/https://www2.dmst.aueb.gr/dds/pubs/jrnl/1997-CompComm-Formal/html/journal.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d0/bd/d0bd6176f069e86140c150a4c4a6064543e8f14a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s0140-3664(99)00030-4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Automated Logic-Based Technique for Formal Verification of Security Protocols

Anca D. Jurcut
<span title="">2018</span> <i title="EJournal Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rwthyuscfbdevlsnttt6rpmbja" style="color: black;">Journal of Advances in Computer Networks</a> </i> &nbsp;
This technique is realised as a special purpose logic for attack detection that can be used throughout the design stage, i.e. it subjects a draft of a protocol to formal analysis prior to its publication  ...  strategies.  ...  This paper is concerned with the use of logic techniques for the formal analysis of security protocols.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18178/jacn.2018.6.2.258">doi:10.18178/jacn.2018.6.2.258</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jqd45l67yndojhru5tjhjafciy">fatcat:jqd45l67yndojhru5tjhjafciy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190712152840/http://www.jacn.net:80/vol6/258-IT018.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/23/c5/23c5b1e6424c095b3b49e4356de991af27fcf428.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18178/jacn.2018.6.2.258"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Minimal backups of cryptographic protocol runs

Jay A. McCarthy, Shriram Krishnamurthi
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 6th ACM workshop on Formal methods in security engineering - FMSE &#39;08</a> </i> &nbsp;
Concretely, our analysis and its implementation consume protocols written in a variant of the Cryptographic Protocol Programming Language, cppl.  ...  Identifying what information is necessary at each point in a protocol run is valuable for both analysis and deployment. We formalize this necessary information as the minimal backup of a protocol.  ...  We are grateful for the advice and encouragement of Joshua Guttman and John Ramsdell.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1456396.1456398">doi:10.1145/1456396.1456398</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/McCarthyK08.html">dblp:conf/ccs/McCarthyK08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/msutatgj4ffmhoh3bm3s6fky5e">fatcat:msutatgj4ffmhoh3bm3s6fky5e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808224250/http://cs.brown.edu/research/plt/dl/fmse2008/backup.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7e/11/7e11ad6dee5967eac42ad5d2d72b34ad5f8db27d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1456396.1456398"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols

Catherine Meadows
<span title="">2004</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hq6x4whtd5hhlhsxzculyeamey" style="color: black;">Science of Computer Programming</a> </i> &nbsp;
In this paper, we give a survey of research in requirements speciÿcation for formal analysis of cryptographic protocols.  ...  The application of formal methods to cryptographic protocol analysis has been a growth area recently.  ...  Acknowledgements I would like to thank Iliano Cervesato for providing the graphics for the strand space and the NPATRL speciÿcations, and the referees of this paper for their comments, which much improved  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.scico.2003.12.001">doi:10.1016/j.scico.2003.12.001</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3ei3ub6jwrfqnims5r35pqgnxq">fatcat:3ei3ub6jwrfqnims5r35pqgnxq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190223062556/https://core.ac.uk/download/pdf/82115607.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/10/f7/10f783b97d49530b19471e36434fea3543c29f33.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.scico.2003.12.001"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Access controls for oblivious and anonymous systems

Scott E. Coull, Matthew Green, Susan Hohenberger
<span title="2011-05-01">2011</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/trn6le535rfr5ma6j7pf3fegae" style="color: black;">ACM Transactions on Privacy and Security</a> </i> &nbsp;
The use of privacy-enhancing cryptographic protocols, such as anonymous credentials and oblivious transfer, often has a detrimental effect on the ability of providers to effectively implement access controls  ...  In this paper, we propose a stateful anonymous credential system that allows the provider to implement non-trivial, real-world access controls on oblivious protocols conducted with anonymous users.  ...  The core innovation here is a protocol for performing state updates, and a technique for "translating" a history-dependent update policy into a cryptographic representation that can be used as an input  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1952982.1952992">doi:10.1145/1952982.1952992</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gcbuyr7lbvccznwd2ho5tsknza">fatcat:gcbuyr7lbvccznwd2ho5tsknza</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120508171113/http://eprint.iacr.org/2008/474.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5a/7a/5a7ac4362071a414f7b77451864717d52504911b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1952982.1952992"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model (Extended Abstract) [chapter]

Zvi Galil, Stuart Haber, Moti Yung
<span title="">1988</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We give a general procedure for designing correct, secure, and fault-tolerant cryptographic protocols for many parties, thus enlarging the domain of tasks that can be performed efficiently by cryptographic  ...  By applying the complexity-theoretic approach to knowledge, we are able to measure and control the computational knowledge released to the various users, as well as its temporal availability.  ...  Acknowledgements We would like to thank Silvio Micali for introducing us to this area of research and for many helpful discussions, and Cynthia Dwork for her careful critical remarks, as well as the members  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-48184-2_10">doi:10.1007/3-540-48184-2_10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ghzpsdxxjfa5hd2lysht6zonpu">fatcat:ghzpsdxxjfa5hd2lysht6zonpu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190217071642/https://static.aminer.org/pdf/20170130/pdfs/crypto/p4znj2omc0axzdumble5tfgg6s3s8qoa.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/11/3c/113cc35e7aa01a462df206c89d3a351df64f07a7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-48184-2_10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis [chapter]

Ivan Cibario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
<span title="">2003</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Many formal techniques for the verification of cryptographic protocols rely on the abstract definition of cryptographic primitives, such as shared, private, and public key encryption.  ...  This approach prevents the analysis of those protocols that explicitly use commutative and associative algebraic operators to build their messages such as, for example, the Diffie-Hellman key-exchange  ...  Conclusions A compact and efficient intruder's knowledge representation is a key point for all formal techniques that use model checking to verify cryptographic protocols.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-39979-7_15">doi:10.1007/978-3-540-39979-7_15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cvyotssxyvdlbj2y7q6wuf3vva">fatcat:cvyotssxyvdlbj2y7q6wuf3vva</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190502135953/https://link.springer.com/content/pdf/10.1007%2F978-3-540-39979-7_15.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0f/5e/0f5e236629513d3c2fb37f6755768ffac304a230.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-39979-7_15"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 6,701 results