Analyzing an electronic cash protocol using applied pi calculus

12Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Untraceability and unreuseability are essential security properties for electronic cash protocols. Many protocols have been proposed to meet these two properties. However, most of them have not been formally proved to be untraceable and unreuseable. In this paper we propose to use the applied pi calculus as a framework for describing and analyzing electronic cash protocols, and we analyze Ferguson's electronic cash protocol as a case study. We believe that this approach is suitable for many different electronic cash protocols. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Luo, Z., Cai, X., Pang, J., & Deng, Y. (2007). Analyzing an electronic cash protocol using applied pi calculus. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4521 LNCS, pp. 87–103). Springer Verlag. https://doi.org/10.1007/978-3-540-72738-5_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free