Filters








160 Hits in 1.9 sec

Nonmonotonic cryptographic protocols

A.D. Rubin, P. Honeyman
Proceedings The Computer Security Foundations Workshop VII  
These are stunning con rmations of the importance of tools for analyzing cryptographic protocols. Rubin  ...  Our technique is the rst to allow reasoning about nonmonotonic protocols. These protocols are needed for systems that rely on the deletion of information.  ...  This is the rst method proposed for reasoning nonmonotonically about knowledge in cryptographic protocols.  ... 
doi:10.1109/csfw.1994.315943 dblp:conf/csfw/RubinH94 fatcat:cc7gq7y55fdxjbs6jyjxwljoqe

Page 6716 of Mathematical Reviews Vol. , Issue 2004i [page]

2004 Mathematical Reviews  
In the past few years, a lot of attention has been paid to the use of special logics to analyze cryptographic authentication protocols.  ...  It provides a convenient formal language for specifying and reasoning about cryptographic protocol requirements. We also provide an axiomatic inference system, a model of computation and semantics.  ... 

Formal verification of cryptographic protocols: A survey [chapter]

Catherine A. Meadows, Catherine A. Meadows
1995 Lecture Notes in Computer Science  
In this paper we give a survey of the state of the art in the application of formal methods to the analysis of cryptographic protocols.  ...  Moser's logic, the only nonmonotonic one considered here, can be used to reason about the way in which beliefs developed through use of cryptographic protocols can be reversed, for example, by learning  ...  are in general more tractable than nonmonotonic ones. 2.  ... 
doi:10.1007/bfb0000430 fatcat:iv53qcjzcjddhcujio6wwlukba

Page 1029 of Mathematical Reviews Vol. , Issue 92b [page]

1992 Mathematical Reviews  
Nait Abdallah, Kernel knowledge versus belt knowledge in default reasoning: a logical approach (pp. 675-686); Li-Yan Yuan, Jia-Huai You and Chenghui Wang, A proof-theoretic framework for nonmonotonic reasoning  ...  - alta, On the importance of memory resources in the security of key exchange protocols (extended abstract) (pp. 11-15); S.  ... 

L–PEP: A Logic to Reason about Privacy–Enhancing Cryptography Protocols [chapter]

Almudena Alcaide, Ali E. Abdallah, Ana I. González–Tablas, José M. de Fuentes
2011 Lecture Notes in Computer Science  
In general, every proposed solution has possed a real challenge to the existing formal methods of protocol analysis and verification.  ...  The main goal of this work is the proposal of a logic to reason about privacyenhancing monotonic and non-monotonic cryptography protocols.  ...  Overview of Our Work The main goal of this work is the proposal of a logic to reason about privacyenhancing cryptographic protocols.  ... 
doi:10.1007/978-3-642-19348-4_9 fatcat:v7a4nxrm55fz3bd3akfza2jy3i

Page 3513 of Mathematical Reviews Vol. , Issue 2004d [page]

2004 Mathematical Reviews  
(German summary) [|Nonmonotone secret sharing schemes] Mitt. Math. Sem. Giessen No. 249 (2002), iv+47 pp.  ...  Liljana Babinkostova (1-BOISE; Boise, ID) 2004d:94031 94A60 68P25 Vajda, Istvan (H-BUTE-TL; Budapest) Extraction of random bits for cryptographic purposes.  ... 

Page 1188 of Mathematical Reviews Vol. , Issue 97B [page]

1997 Mathematical Reviews  
Summary: “The wide applicability of zero-knowledge interactive proofs comes from the possibility of using these proofs as sub- routines in cryptographic protocols.  ...  The battery is based on 20 rationality postulates of the types developed in studies of theory change and nonmonotonic reasoning.  ... 

Evaluating encrypted Boolean functions on encrypted bits: secure decision-making on the black side

Rajesh Krishnan, Ravi Sundaram, Raja Suresh
2013 Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2013  
Building upon Barrington's work to transform circuits to group programs and the Feige-Kilian-Naor cryptographic protocol, our novel Fixed Structure Group Program construction for secure evaluation eliminates  ...  This efficiently parallelizable class includes nonmonotone Boolean expressions of equality, inequality/range, Hamming distance, Boolean matrix multiplication, and kof-m threshold matching operations.  ...  The protocol is illustrated in Figure 5 .  ... 
doi:10.1117/12.2018574 fatcat:d67jee24wjbc7olj2p3rfro6pm

RUASN: A Robust User Authentication Framework for Wireless Sensor Networks

Pardeep Kumar, Amlan Jyoti Choudhury, Mangal Sain, Sang-Gon Lee, Hoon-Jae Lee
2011 Sensors  
Confidentiality: It is desirable that a user authentication protocol facilitate confidentiality of messages; as a result, these confidential messages can only be used by authorized users.  ...  Nonmonotonic Cryptographic Protocol This sub-section describes the nonmonotonic cryptographic protocol (NCP), which is also known as Rubin Logic.  ...  Nonmonotonic Cryptographic Protocol and RUASN Analysis and Verification This section presents, first, the nonmonotonic cryptographic protocol (NCP) [24] , and second, formal analysis and verification  ... 
doi:10.3390/s110505020 pmid:22163888 pmcid:PMC3231354 fatcat:mbenyrkl45dhbjts6klwzjcxb4

Lightweight Security Protocols for Internet of Things: A Review

Deepti Rani, Maharshi Dayanand University, Rohtak, Haryana (India)
2019 International Journal of Advanced Trends in Computer Science and Engineering  
Lightweight protocols are characterized by relatively small overhead.  ...  The present paper presents a range of various existing as well as proposed lightweight security protocols.  ...  Diffie-Hellman Algorithm is an asymmetric cryptography protocol that is designed over public-key cryptographic protocol [15] .  ... 
doi:10.30534/ijatcse/2019/58832019 fatcat:7wtxzomxcnfu7latkr3bl443e4

Inductive analysis of the Internet protocol TLS

Lawrence C. Paulson
1999 ACM Transactions on Privacy and Security  
Session keys are negotiated rather than distributed, and the protocol has many optional parts.  ...  TLS, even at an abstract level, is much more complicated than most protocols that researchers have verified.  ...  In his Ph.D. thesis, Dietrich [1997] analyses SSL 3.0 using the belief logic NCP (Nonmonotonic Cryptographic Protocols).  ... 
doi:10.1145/322510.322530 fatcat:f5ej5t6tdnabjcyuk3zwgr45va

A Strong Token Authentication And Cryptography Based Application And Data Access For Cloud Users

Ali Asgar Hussain
2016 International Journal Of Engineering And Computer Science  
The cryptographic standards serve multiple algorithms simultaneously. II.  ...  It is important to name protocol type, protocol step, source and destination of a message explicitly in the message.  ... 
doi:10.18535/ijecs/v4i10.02 fatcat:jujzbcwudvbxfehhplkh3zkf2u

Quantum Computation and Information: Multi-Particle Aspects

Demosthenes Ellinas, Giorgio Kaniadakis, Jiannis Pachos, Antonio Scarfone
2016 Entropy  
These actions are mediated by the help of shared quantum entanglement among agents within the framework of communication protocols such as LOCC.  ...  They find that the mean lifetime of the superconductive metastable state as a function of the noise intensity is characterized by nonmonotonic behavior.  ... 
doi:10.3390/e18090339 fatcat:ih46b43vxfghdl5bkxa4je2esu

Formal Support for Standardizing Protocols with State [chapter]

Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe
2015 Lecture Notes in Computer Science  
Many cryptographic protocols are designed to achieve their goals using only messages passed over an open network.  ...  Keywords: protocol analysis tools, stateful protocols, TPM, PKCS#11.  ...  Cryptographic version. The cryptographic version of this protocol uses a TPM to achieve the security goal. Here we restrict our attention to a subset of the TPM's functionality.  ... 
doi:10.1007/978-3-319-27152-1_13 fatcat:4pv5cxooz5dorldzl6gwmcr5w4

D1.7 - Policy, transparency and compliance guidelines V2

Piero Bonatti, Sabrina Kirrane, Rigo Wenning, Philip Raschke
2018 Zenodo  
Cryptographic features for the ledger infrastructure and fair-exchange protocols will be investigated at a later stage.  ...  On the selection of cryptographic primitives. Special care needs to be considered when selecting cryptographic signatures.  ... 
doi:10.5281/zenodo.2549549 fatcat:5xwvoijxubb7xg4xerjdtekjq4
« Previous Showing results 1 — 15 out of 160 results