Filters








25,763 Hits in 2.1 sec

Analysis of Probabilistic Contract Signing [chapter]

Gethin Norman, Vitaly Shmatikov
2003 Lecture Notes in Computer Science  
Our study demonstrates the difficulty of combining fairness with timeliness in the context of probabilistic contract signing.  ...  We consider the probabilistic contract signing protocol of Ben-Or, Goldreich, Micali, and Rivest as a case study in formal verification of probabilistic security protocols.  ...  We analysed a timely variant of the probabilistic contract signing of Ben-Or, Goldreich, Micali, and Rivest using PRISM, a probabilistic model checker, and showed that there exists an attack strategy for  ... 
doi:10.1007/978-3-540-40981-6_9 fatcat:jhx7nwzti5ajto6un7wlq6xf4q

Computationally Sound Analysis of a Probabilistic Contract Signing Protocol [chapter]

Mihhail Aizatulin, Henning Schnoor, Thomas Wilke
2009 Lecture Notes in Computer Science  
We propose a probabilistic contract signing protocol that achieves balance even in the presence of an adversary that may delay messages sent over secure channels.  ...  To show that this property holds in a computational setting, we first propose a probabilistic framework for protocol analysis, then prove that in a symbolic setting the protocol satisfies a probabilistic  ...  We have introduced a formal model for analysis of probabilistic protocols and proved its soundness with respect to computational security, implying that our protocol is balanced in the sense of [CKW07  ... 
doi:10.1007/978-3-642-04444-1_35 fatcat:iaqkb33v4zetdl4tcsmpxl2a6m

Analysis of probabilistic contract signing1

Gethin Norman, Vitaly Shmatikov
2006 Journal of Computer Security  
Our study demonstrates the difficulty of combining fairness with timeliness in the context of probabilistic contract signing.  ...  We consider the probabilistic contract signing protocol of Ben-Or, Goldreich, Micali, and Rivest as a case study in formal verification of probabilistic security protocols.  ...  We analysed a timely variant of the probabilistic contract signing of Ben-Or, Goldreich, Micali, and Rivest using PRISM, a probabilistic model checker, and showed that there exists an attack strategy for  ... 
doi:10.3233/jcs-2006-14604 fatcat:hi523pkxqfgy7o3m3ftatsvfnu

Probabilistic analysis of the ASW protocol using PRISM

Salekul Islam, Mohammad Abu Zaid
2008 IEEE SoutheastCon 2008  
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the aid of a trusted third  ...  First, the security objectives of ASW protocol have been defined with probabilistic equations.  ...  Islam acknowledges the support of Quebec Government through its FQRNT scholarship program and of Concordia University.  ... 
doi:10.1109/secon.2008.4494277 fatcat:4wioyo7albfvfcetx7t6ssgv6a

Programming language methods in computer security

John C. Mitchell
2001 Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '01  
find some attacks • Successful analysis of industrial protocols uOther attacks are outside model • Interaction between protocol and encryption Probabilistic Poly-time Analysis uAdopt spi-calculus approach  ...  Contract signinguBoth parties want to sign the contract uNeither wants to commit first m1= sign(A, 〈c, hash(r_A)〉 ) sign(B, 〈m1, hash(r_B)〉 ) r_A Immunity deal General protocol outline uTrusted third  ... 
doi:10.1145/360204.360205 dblp:conf/popl/Mitchell01 fatcat:lyouxkydtrgpthu4eobclsr47e

Programming language methods in computer security

John C. Mitchell
2001 SIGPLAN notices  
find some attacks • Successful analysis of industrial protocols uOther attacks are outside model • Interaction between protocol and encryption Probabilistic Poly-time Analysis uAdopt spi-calculus approach  ...  Contract signinguBoth parties want to sign the contract uNeither wants to commit first m1= sign(A, 〈c, hash(r_A)〉 ) sign(B, 〈m1, hash(r_B)〉 ) r_A Immunity deal General protocol outline uTrusted third  ... 
doi:10.1145/373243.360205 fatcat:goxv5ofrifhmveq2egwh2bnnka

Exogenous Probabilistic Computation Tree Logic

Pedro Baltazar, Paulo Mateus, Rajagopal Nagarajan, Nikolaos Papanikolaou
2007 Electronical Notes in Theoretical Computer Science  
properties for a classical contract signing protocol and for the so-called quantum one-time pad.  ...  We define a logic EpCTL for reasoning about the evolution of probabilistic systems.  ...  A Contract Signing Protocol The problem of contract signing is to find a way of getting two users, A and B, to commit to a contract C in such a way that neither party may falsely convince the other that  ... 
doi:10.1016/j.entcs.2007.07.007 fatcat:gwskqgyzovcidawl3yb5mj72pa

Controller Dependability Analysis by Probabilistic Model Checking

Marta Kwiatkowska, Gethin Norman, David Parker
2004 IFAC Proceedings Volumes  
• Quality of service: real-time comm. protocols: • Security protocols: anonymity, contract signing, ... • Randomised algorithms: leader election, consensus, ...  ...  Conclusions • Analysis of dependability properties using probabilistic model checking -Existing tool support: PRISM -High-level modelling languages -Flexible/unambiguous property specification -Efficient  ... 
doi:10.1016/s1474-6670(17)36115-3 fatcat:or7rf2hkafhoxmubbouzfobzsa

Controller dependability analysis by probabilistic model checking

Marta Kwiatkowska, Gethin Norman, David Parker
2007 Control Engineering Practice  
• Quality of service: real-time comm. protocols: • Security protocols: anonymity, contract signing, ... • Randomised algorithms: leader election, consensus, ...  ...  Conclusions • Analysis of dependability properties using probabilistic model checking -Existing tool support: PRISM -High-level modelling languages -Flexible/unambiguous property specification -Efficient  ... 
doi:10.1016/j.conengprac.2006.07.003 fatcat:i7ejnerwnvgkfjnmmyskeprcae

Page 22 of Current Literature in Traffic and Transportation Vol. 18, Issue 1 [page]

1977 Current Literature in Traffic and Transportation  
Traffic Analysis Ashworth, R. A VIDEOTAPE-RECORDING SYSTEM FOR TRAFFIC DATA COLLECTION AND ANALYSIS [University of Sheffield research] Traf.Eng.& Control, Nov.1976, p.468-470. illus., charts, table.  ...  THE UNPUBLISHED SCHEDULE OF URBAN PEAK Trspn.Sci., Aug.1976, p.300-315. Traffic Assignment Control Analysis Corporation.  ... 

PRISM: A Tool for Automatic Verification of Probabilistic Systems [chapter]

Andrew Hinton, Marta Kwiatkowska, Gethin Norman, David Parker
2006 Lecture Notes in Computer Science  
Probabilistic model checking is an automatic formal verification technique for analysing quantitative properties of systems which exhibit stochastic behaviour.  ...  PRISM is a probabilistic model checking tool which has already been successfully deployed in a wide range of application domains, from real-time communication protocols to biological signalling pathways  ...  LANs; -probabilistic security protocols for anonymity (Crowds protocol, synchronous batching), contract signing, fair exchange and non-repudiation; -randomised distributed algorithms for leader election  ... 
doi:10.1007/11691372_29 fatcat:qksgy2exbnhnfao2vxq75l6j5q

A fair protocol for signing contracts

M. Ben-Or, O. Goldreich, S. Micali, R.L. Rivest
1990 IEEE Transactions on Information Theory  
We present a fair, cryptographic protocol for signing contracts that makes use of the weakest possible form of a trusted thCrdparty 6udge).  ...  (Symmetrically, when switching the roles of '4 and B). Contract signing protocols cannot be fair without relying on a trusted third party.  ...  For the purpose of this extended abstract, it wilt be convenient to decouple the analysis of a contract signing protocol from the security of the underlying signature scheme used in its implementation.  ... 
doi:10.1109/18.50372 fatcat:e5p2czk3xfebfmhj4wzrdhgbwe

A Knowledge-Based Analysis of the Blockchain Protocol

Joseph Y. Halpern, Rafael Pass
2017 Electronic Proceedings in Theoretical Computer Science  
To the extent that a blockchain protocol is used for applications such as contract signing and making certain transactions (such as house sales) public, we need to understand what guarantees the protocol  ...  We then consider some scenarios involving contracts and show that this level of knowledge suffices for some scenarios, but not others.  ...  In the context of contract signing, this means that once the first person has signed the contract, every honest party in the system will know within ∆ time units that the contract has been signed.  ... 
doi:10.4204/eptcs.251.22 fatcat:swvsbjtdqrbknm2uybtctot6kq

Proposed method for probabilistic risk analysis using building performance simulations and stochastic parameters

Tomas Ekström, Stephen Burke, Lars-Erik Harderup, Jesper Arfvidsson, J. Kurnitski, T. Kalamees
2020 E3S Web of Conferences  
This paper presents a preliminary method developed using probabilistic methods for risk analysis and building performance simulations to predict the energy performance of buildings using stochastic parameters  ...  The consequences are quantified using an example of energy performance contracting to evaluate the inherent risk of a building's design.  ...  In Sweden, it is becoming more common that construction companies sign a so-called "Energy Performance Contract" or Guaranteed Energy Use agreement.  ... 
doi:10.1051/e3sconf/202017225005 fatcat:j3oqx3ay3bgfbdk4dzrgjwpjbe

Automated Reasoning for Security Protocol Analysis

Alessandro Armando, David Basin, Jorge Cuellar, Michaël Rusinowitch, Luca Viganò
2005 Journal of automated reasoning  
It is now widely recognized that only formal analysis can provide the level of assurance required by both the developers and the users of the protocols.  ...  These papers offer a good overview of the current research on automated reasoning techniques and tools for the formal specification, analysis, and verification of security protocols.  ...  In the paper Formal Analysis of MultiParty Contract Signing Chadha, Kremer, and Scedrov analyze the multiparty contract-signing protocols of Garay and MacKenzie (GM) and of Baum and Waidner (BW).  ... 
doi:10.1007/s10817-005-9014-x fatcat:pfbxgpnoovcf5o34bucygwedxm
« Previous Showing results 1 — 15 out of 25,763 results