The Internet Archive has a preservation copy of this work in our general collections.
The file type is
Security protocols often use randomization to achieve probabilistic non-determinism. This non-determinism, in turn, is used in obfuscating the dependence of observable values on secret data. Since the correctness of security protocols is very important, formal analysis of security protocols has been widely studied in literature. Randomized security protocols have also been analyzed using formal techniques such as process-calculi and probabilistic model checking. In this paper, we consider thearXiv:0906.5110v1 fatcat:pwtnxrom7bgurmyfbsh6s32f4u