Canetti, Ran
[MIT]
Cheung, Ling
[MIT]
Kaynar, Dilsun
[MIT]
Liskov, Moses
[MIT]
Lynch, Nancy
[MIT]
Pereira, Olivier
[UCL]
Segala, Roberto
[University of Verona]
Modelling cryptographic protocols and analysing their security is a tricky business. On the one hand, valid modelling and analysis must address the concurrency aspects of asynchronous distributed systems, with potentially adversarial scheduling of events. On the other hand, realistic analysis must accommodate the fact that, in most interesting cases, it is impossible to completely prevent successful attacks against the protocol. Instead, we can only bound the success probability of attacks that use a bounded amount of computational resources, based on underlying computational hardness assumptions.
Bibliographic reference |
Canetti, Ran ; Cheung, Ling ; Kaynar, Dilsun ; Liskov, Moses ; Lynch, Nancy ; et. al. Using Probabilistic I/O Automata to improve the analysis of cryptographic protocols. In: Ercim News, Vol. 63, no.1, p. 40-41 (2005) |
Permanent URL |
http://hdl.handle.net/2078.1/154801 |