A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Analysis of Probabilistic Contract Signing
[chapter]
2003
Lecture Notes in Computer Science
Our study demonstrates the difficulty of combining fairness with timeliness in the context of probabilistic contract signing. ...
We consider the probabilistic contract signing protocol of Ben-Or, Goldreich, Micali, and Rivest as a case study in formal verification of probabilistic security protocols. ...
We analysed a timely variant of the probabilistic contract signing of Ben-Or, Goldreich, Micali, and Rivest using PRISM, a probabilistic model checker, and showed that there exists an attack strategy for ...
doi:10.1007/978-3-540-40981-6_9
fatcat:jhx7nwzti5ajto6un7wlq6xf4q
Computationally Sound Analysis of a Probabilistic Contract Signing Protocol
[chapter]
2009
Lecture Notes in Computer Science
We propose a probabilistic contract signing protocol that achieves balance even in the presence of an adversary that may delay messages sent over secure channels. ...
To show that this property holds in a computational setting, we first propose a probabilistic framework for protocol analysis, then prove that in a symbolic setting the protocol satisfies a probabilistic ...
We have introduced a formal model for analysis of probabilistic protocols and proved its soundness with respect to computational security, implying that our protocol is balanced in the sense of [CKW07 ...
doi:10.1007/978-3-642-04444-1_35
fatcat:iaqkb33v4zetdl4tcsmpxl2a6m
Analysis of probabilistic contract signing1
2006
Journal of Computer Security
Our study demonstrates the difficulty of combining fairness with timeliness in the context of probabilistic contract signing. ...
We consider the probabilistic contract signing protocol of Ben-Or, Goldreich, Micali, and Rivest as a case study in formal verification of probabilistic security protocols. ...
We analysed a timely variant of the probabilistic contract signing of Ben-Or, Goldreich, Micali, and Rivest using PRISM, a probabilistic model checker, and showed that there exists an attack strategy for ...
doi:10.3233/jcs-2006-14604
fatcat:hi523pkxqfgy7o3m3ftatsvfnu
Probabilistic analysis of the ASW protocol using PRISM
2008
IEEE SoutheastCon 2008
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the aid of a trusted third ...
First, the security objectives of ASW protocol have been defined with probabilistic equations. ...
Islam acknowledges the support of Quebec Government through its FQRNT scholarship program and of Concordia University. ...
doi:10.1109/secon.2008.4494277
fatcat:4wioyo7albfvfcetx7t6ssgv6a
Programming language methods in computer security
2001
Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '01
find some attacks • Successful analysis of industrial protocols uOther attacks are outside model • Interaction between protocol and encryption Probabilistic Poly-time Analysis uAdopt spi-calculus approach ...
Contract signinguBoth parties want to sign the contract uNeither wants to commit first m1= sign(A, 〈c, hash(r_A)〉 ) sign(B, 〈m1, hash(r_B)〉 ) r_A Immunity
deal
General protocol outline
uTrusted third ...
doi:10.1145/360204.360205
dblp:conf/popl/Mitchell01
fatcat:lyouxkydtrgpthu4eobclsr47e
Programming language methods in computer security
2001
SIGPLAN notices
find some attacks • Successful analysis of industrial protocols uOther attacks are outside model • Interaction between protocol and encryption Probabilistic Poly-time Analysis uAdopt spi-calculus approach ...
Contract signinguBoth parties want to sign the contract uNeither wants to commit first m1= sign(A, 〈c, hash(r_A)〉 ) sign(B, 〈m1, hash(r_B)〉 ) r_A Immunity
deal
General protocol outline
uTrusted third ...
doi:10.1145/373243.360205
fatcat:goxv5ofrifhmveq2egwh2bnnka
Exogenous Probabilistic Computation Tree Logic
2007
Electronical Notes in Theoretical Computer Science
properties for a classical contract signing protocol and for the so-called quantum one-time pad. ...
We define a logic EpCTL for reasoning about the evolution of probabilistic systems. ...
A Contract Signing Protocol The problem of contract signing is to find a way of getting two users, A and B, to commit to a contract C in such a way that neither party may falsely convince the other that ...
doi:10.1016/j.entcs.2007.07.007
fatcat:gwskqgyzovcidawl3yb5mj72pa
Controller Dependability Analysis by Probabilistic Model Checking
2004
IFAC Proceedings Volumes
• Quality of service: real-time comm. protocols:
• Security protocols: anonymity, contract signing, ...
• Randomised algorithms: leader election, consensus, ... ...
Conclusions • Analysis of dependability properties using probabilistic model checking -Existing tool support: PRISM -High-level modelling languages -Flexible/unambiguous property specification -Efficient ...
doi:10.1016/s1474-6670(17)36115-3
fatcat:or7rf2hkafhoxmubbouzfobzsa
Controller dependability analysis by probabilistic model checking
2007
Control Engineering Practice
• Quality of service: real-time comm. protocols:
• Security protocols: anonymity, contract signing, ...
• Randomised algorithms: leader election, consensus, ... ...
Conclusions • Analysis of dependability properties using probabilistic model checking -Existing tool support: PRISM -High-level modelling languages -Flexible/unambiguous property specification -Efficient ...
doi:10.1016/j.conengprac.2006.07.003
fatcat:i7ejnerwnvgkfjnmmyskeprcae
Page 22 of Current Literature in Traffic and Transportation Vol. 18, Issue 1
[page]
1977
Current Literature in Traffic and Transportation
Traffic Analysis
Ashworth, R. A VIDEOTAPE-RECORDING SYSTEM FOR TRAFFIC DATA COLLECTION AND ANALYSIS [University of Sheffield research] Traf.Eng.& Control, Nov.1976, p.468-470. illus., charts, table. ...
THE UNPUBLISHED SCHEDULE OF URBAN PEAK Trspn.Sci., Aug.1976, p.300-315.
Traffic Assignment
Control Analysis Corporation. ...
PRISM: A Tool for Automatic Verification of Probabilistic Systems
[chapter]
2006
Lecture Notes in Computer Science
Probabilistic model checking is an automatic formal verification technique for analysing quantitative properties of systems which exhibit stochastic behaviour. ...
PRISM is a probabilistic model checking tool which has already been successfully deployed in a wide range of application domains, from real-time communication protocols to biological signalling pathways ...
LANs; -probabilistic security protocols for anonymity (Crowds protocol, synchronous batching), contract signing, fair exchange and non-repudiation; -randomised distributed algorithms for leader election ...
doi:10.1007/11691372_29
fatcat:qksgy2exbnhnfao2vxq75l6j5q
A fair protocol for signing contracts
1990
IEEE Transactions on Information Theory
We present a fair, cryptographic protocol for signing contracts that makes use of the weakest possible form of a trusted thCrdparty 6udge). ...
(Symmetrically, when switching the roles of '4 and B). Contract signing protocols cannot be fair without relying on a trusted third party. ...
For the purpose of this extended abstract, it wilt be convenient to decouple the analysis of a contract signing protocol from the security of the underlying signature scheme used in its implementation. ...
doi:10.1109/18.50372
fatcat:e5p2czk3xfebfmhj4wzrdhgbwe
A Knowledge-Based Analysis of the Blockchain Protocol
2017
Electronic Proceedings in Theoretical Computer Science
To the extent that a blockchain protocol is used for applications such as contract signing and making certain transactions (such as house sales) public, we need to understand what guarantees the protocol ...
We then consider some scenarios involving contracts and show that this level of knowledge suffices for some scenarios, but not others. ...
In the context of contract signing, this means that once the first person has signed the contract, every honest party in the system will know within ∆ time units that the contract has been signed. ...
doi:10.4204/eptcs.251.22
fatcat:swvsbjtdqrbknm2uybtctot6kq
Proposed method for probabilistic risk analysis using building performance simulations and stochastic parameters
2020
E3S Web of Conferences
This paper presents a preliminary method developed using probabilistic methods for risk analysis and building performance simulations to predict the energy performance of buildings using stochastic parameters ...
The consequences are quantified using an example of energy performance contracting to evaluate the inherent risk of a building's design. ...
In Sweden, it is becoming more common that construction companies sign a so-called "Energy Performance Contract" or Guaranteed Energy Use agreement. ...
doi:10.1051/e3sconf/202017225005
fatcat:j3oqx3ay3bgfbdk4dzrgjwpjbe
Automated Reasoning for Security Protocol Analysis
2005
Journal of automated reasoning
It is now widely recognized that only formal analysis can provide the level of assurance required by both the developers and the users of the protocols. ...
These papers offer a good overview of the current research on automated reasoning techniques and tools for the formal specification, analysis, and verification of security protocols. ...
In the paper Formal Analysis of MultiParty Contract Signing Chadha, Kremer, and Scedrov analyze the multiparty contract-signing protocols of Garay and MacKenzie (GM) and of Baum and Waidner (BW). ...
doi:10.1007/s10817-005-9014-x
fatcat:pfbxgpnoovcf5o34bucygwedxm
« Previous
Showing results 1 — 15 out of 25,763 results