Filters








3,095 Hits in 2.9 sec

Formal Analysis of Multiparty Contract Signing

Rohit Chadha, Steve Kremer, Andre Scedrov
2006 Journal of automated reasoning  
We analyze the multi-party contract-signing protocols of Garay and MacKenzie (GM) and of Baum and Waidner (BW).  ...  While our analysis does not reveal any errors in the BW protocol, in the GM protocol we discover serious problems with fairness for four signers and an oversight regarding abuse-freeness for three signers  ...  There have been several applications of formal methods to contract signing, so far only for the special case of two signers.  ... 
doi:10.1007/s10817-005-9019-5 fatcat:25kbldust5gelb4ydsitswrlgi

Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol

Xiaoru Li, Xiaohong Li, Guangquan Xu, Jing Hu, Zhiyong Feng
2014 Journal of Applied Mathematics  
Optimistic multiparty contract signing (OMPCS) protocols are proposed for exchanging multiparty digital signatures in a contract.  ...  In our analysis, we employ and combine the strength of extended modeling language CSP# and linear temporal logic (LTL) to verify the fairness of OMPCS protocols.  ...  Acknowledgment This work was supported in part by the National Science Foundation of China (nos. 91118003, 61272106, and 61003080).  ... 
doi:10.1155/2014/983204 fatcat:u2pbvxlijja55bamzoyt5hxohm

Multiparty Contract Signing Over a Reliable Network

Simona Orzan, Erik de Vink
2006 Electronical Notes in Theoretical Computer Science  
The second issue concerns the formal analysis of multiparty contract signing protocols and fair exchange protocols in general.  ...  We want to formally prove security properties of multiparty contract signing protocols parametric in the number of participants.  ...  However, the proof provides a starting point for formal verification of parametrized multiparty contract signing protocols.  ... 
doi:10.1016/j.entcs.2005.09.042 fatcat:fjxaz54ebjacbcyvl2jt2aq2uu

Automated Reasoning for Security Protocol Analysis

Alessandro Armando, David Basin, Jorge Cuellar, Michaël Rusinowitch, Luca Viganò
2005 Journal of automated reasoning  
It is now widely recognized that only formal analysis can provide the level of assurance required by both the developers and the users of the protocols.  ...  These papers offer a good overview of the current research on automated reasoning techniques and tools for the formal specification, analysis, and verification of security protocols.  ...  In the paper Formal Analysis of MultiParty Contract Signing Chadha, Kremer, and Scedrov analyze the multiparty contract-signing protocols of Garay and MacKenzie (GM) and of Baum and Waidner (BW).  ... 
doi:10.1007/s10817-005-9014-x fatcat:pfbxgpnoovcf5o34bucygwedxm

Relating Process Languages for Security and Communication Correctness (Extended Abstract) [chapter]

Daniele Nantes, Jorge A. Pérez
2018 Lecture Notes in Computer Science  
They have been very successful in two research strands: (a) the analysis of security protocols and (b) the enforcement of correct messagepassing programs.  ...  We establish the correctness of our encoding, and we show how it enables the integrated analysis of security properties and communication correctness by re-using existing tools.  ...  The lack of these constructs prevents the formal analysis of authentication properties.  ... 
doi:10.1007/978-3-319-92612-4_5 fatcat:zm5driw2ovdp3c4ceqdgsflrau

A Highly-Secure Self-Protection Data Scheme in Clouds Using Active Data Bundles and Agent-Based Secure Multi-party Computation

Akram Y. Sarhan, Steve Carr
2017 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)  
Multi-agent systems JADE Attribute-based encryption CP-ABE  Current work status • Completed design of the APB-SMC scheme • Working on modeling, formal model analysis, simulation experiments  ...  1) APB creation • Identify sensitive data • Create access policy attributes • Create access structure • Generate public and master keys • Encrypt sensitive data • Encrypt metadata • Hash and sign  ... 
doi:10.1109/cscloud.2017.36 dblp:conf/cscloud/SarhanC17 fatcat:djwxdzl45bbptpdr2lwua2rgiy

Intelligent Modeling and Verification 2014

Guiming Luo, Xiaoyu Song, Xiaojing Yang, Krishnaiyan Thulasiraman
2014 Journal of Applied Mathematics  
A total of 16 papers describe optimal system modeling. They focus on system modeling, optimal filtering and scheduling, image modeling, pattern recognition, and network modeling.  ...  After the success of the previous special issue Intelligent Modeling and Verification, which was published last year, we are pleased to announce that the new special issue Intelligent Modeling and Verification  ...  In addition, we would like to express our appreciation for the editorial board members of this journal, who provided valuable help and support throughout the preparation of this special issue.  ... 
doi:10.1155/2014/632027 fatcat:qfrhxkghfnccrnjm5mqxygzcjy

A Blockchain-based Iterative Double Auction Protocol using Multiparty State Channels

Truc Nguyen, My T. Thai
2020 ACM Transactions on Internet Technology  
Then we provide a formal development of the proposed framework and prove the security of our design against adversaries.  ...  In specific, we propose an extension to the original concept of state channels that can support multiparty computation.  ...  Then, we provide formal security definitions and specifications with a detailed security analysis of our framework in Section 4.  ... 
doi:10.1145/3389249 fatcat:sezu6rtexfdwtgpiapzcsdzqpu

Disjointness is Hard in the Multiparty Number-on-the-Forehead Model

Troy Lee, Adi Shraibman
2009 Computational Complexity  
In the multiparty case, the discrepancy method is the only technique which has been used to show lower bounds on the general randomized model of number-on-the-forehead complexity.  ...  One source of this difficulty is that, whereas in the two party case we can nicely represent the function f (x, y) as a matrix, in the multiparty case we deal with higher dimensional tensors.  ...  Acknowledgments We greatly benefited during the course of this work from comments and conversations with Paul Beame, Harry Buhrman, Mike Saks, Gideon Schechtman, Nate Segerlind, Sasha Sherstov, Roberť  ... 
doi:10.1007/s00037-009-0276-2 fatcat:ovvpwvx6s5g2fncwviztxd5ice

Towards a Paradigm of Multiparty Negotiation

Larry Crump, A. Ian Glendon
2003 International Negotiation  
To engage a "villain" in negotiation may be perceived as an act of appeasement -as validating the aggression -or as a sign of weakness (Spector 1998) .  ...  However, the level of analysis for such research is often at a macro level, while research at a micro level is less common.  ... 
doi:10.1163/157180603322576112 fatcat:ado6mo7tqfe7fj3ng3dadksjna

Opposition Weakness in Africa

Lise Rakner, Nicolas van de Walle
2009 Journal of Democracy  
Before November 1989-the date of Namibia's independence and the generally accepted beginning of sub-Sarahan Africa's democratic wave-only Botswana and Mauritius had held regular multiparty elections.  ...  This essay examines the impact of elections on democratization in the fledgling multiparty systems of sub-Saharan Africa, and especially the extent to which opposition parties in the region are able to  ...  Our analysis of factors that may explain the weaknesses of opposition parties has emphasized the links between formal institutions and political strategies.  ... 
doi:10.1353/jod.0.0096 fatcat:6rzshyjlbngntbfvpoyjcd5ug4

Algeria's Army, Algeria's Agony

Lahouari Addi
1998 Foreign Affairs  
In the final analysis, however, Algeria's crisis can be resolved only by ending the dichotomy that lies at its roots; between an informal real power and an impotent formal power.  ...  But that means that all the political parties, including the FIS, must first agree on a national contract that sets out the rules of the game and enshrines a multiparty system, civil liberties, and electoral  ... 
doi:10.2307/20048964 fatcat:t453botc5naxfpxufolgoeedqe

Rethinking Consent in International Commercial Arbitration: A General Theory for Non-signatories

Stavros Brekoulakis
2017 Journal of International Dispute Settlement  
consent to the concept of a 'dispute'.  ...  The article challenges the efficacy and coherence of the existing arbitration law in this area, and questions whether the traditional concept of consent for arbitration can be reconciled with complex commercial  ...  Hillman, The Richness Of Contract Law: An Analysis And Critique Of Contemporary Theories Of Contract Law (1997).  ... 
doi:10.1093/jnlids/idx012 fatcat:kyf6ufp6q5e7nemwiw7otm4f5q

Securing Multiparty Online Services Via Certification of Symbolic Transactions

Eric Y. Chen, Shuo Chen, Shaz Qadeer, Rui Wang
2015 2015 IEEE Symposium on Security and Privacy  
The prevalence of security flaws in multiparty online services (e.g., single-sign-on, third-party payment, etc.) calls for rigorous engineering supported by formal program verification.  ...  Our security analysis shows that 12 out of 14 logic flaws reported in the literature will be prevented by CST.  ...  Ball, John Douceur, Úlfar Erlingsson, Cormac Herley, Jaeyeon Jung, Jay Lorch, Madan Musuvathi, Ed Nightingale, Prateek Saxena, Nik Swamy, Helen Wang and Lidong Zhou for commenting on an earlier version of  ... 
doi:10.1109/sp.2015.56 dblp:conf/sp/ChenCQ015 fatcat:cr33vgfug5ey3ao2j6genuulym

Disjointness Is Hard in the Multi-party Number-on-the-Forehead Model

Troy Lee, Adi Shraibman
2008 2008 23rd Annual IEEE Conference on Computational Complexity  
In the multiparty case, the discrepancy method is the only technique which has been used to show lower bounds on the general randomized model of number-on-the-forehead complexity.  ...  One source of this difficulty is that, whereas in the two party case we can nicely represent the function f (x, y) as a matrix, in the multiparty case we deal with higher dimensional tensors.  ...  Acknowledgments We greatly benefited during the course of this work from comments and conversations with Paul Beame, Harry Buhrman, Mike Saks, Gideon Schechtman, Nate Segerlind, Sasha Sherstov, Roberť  ... 
doi:10.1109/ccc.2008.29 dblp:conf/coco/LeeS08 fatcat:b66xomhev5adddw6ry6qjny6xa
« Previous Showing results 1 — 15 out of 3,095 results