Constraint solving for contract-signing protocols

14Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was shown that certain game-theoretic security properties, such as balance for contract-signing protocols, are decidable in a Dolev-Yao style model with a bounded number of sessions but unbounded message size. However, this result does not provide a practical algorithm as it merely bounds the size of attacks. In this paper, we prove that game-theoretic security properties can be decided based on standard constraint solving procedures. In the past, these procedures have successfully been employed in implementations and tools for reachability properties. Our results thus pave the way for extending these tools and implementations to deal with game-theoretic security properties. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Kähler, D., & Küsters, R. (2005). Constraint solving for contract-signing protocols. In Lecture Notes in Computer Science (Vol. 3653, pp. 233–247). Springer Verlag. https://doi.org/10.1007/11539452_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free