A Constraint-Based Algorithm for Contract-Signing Protocols

zum Volltext (317 kB)   ZIP
Beteiligte Person(en) / Institution(en)Autor :
DatumErschienen :
  • April 2005
Seitenbereich42 S.

Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was shown that certain game-theoretic security properties, such as balance for contract-signing protocols, are decidable in a Dolev-Yao style model with a bounded number of sessions but unbounded message size. However, this result does not provide a practical algorithm as it merely bounds the size of attacks. In this paper, we prove that game-theoretic security properties can be decided based on standard constraint solving procedures. This paves the way for extending existing implementations and tools for reachability properties to deal with game-theoretic security properties.
Statische URLhttps://www.uni-kiel.de/journals/receive/jportal_jparticle_00000141
IDNummer des Berichts :
  • TR_0503