An extension of typed MSR for specifying esoteric protocols and their Dolev-Yao intruder

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Esoteric protocols, such as electronic cash, electronic voting and selective disclosure protocols, use special message constructors that are not widely used in other types of protocols (for example, in authentication protocols). These message constructors include blind signatures, commitments and zero-knowledge proofs. Furthermore, a standard formalization of the Dolev-Yao intruder [6] does not take into account these message constructors, nor does it consider some types of attacks (such as privacy attacks, brute-force dictionary attacks and knownplaintext attacks) that esoteric as well as other types of protocols are designed to protect against. This paper aims to present an extension of typed MSR [3, 4] in order to formally specify the needed message constructors, as well as the capabilities of a Dolev-Yao intruder designed to attack esoteric protocols. © 2005 by International Federation for Information Processing.

Cite

CITATION STYLE

APA

Balopoulos, T., Gritzalis, S., & Katsikas, S. K. (2005). An extension of typed MSR for specifying esoteric protocols and their Dolev-Yao intruder. In IFIP Advances in Information and Communication Technology (Vol. 175, pp. 209–221). Springer New York LLC. https://doi.org/10.1007/0-387-24486-7_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free