Untraceability and unreuseability are essential security properties for electronic cash protocols. Many protocols have been proposed to meet these two properties. However, most of them have not been formally proved to be untraceable and unreuseable. In this paper we propose to use the applied pi calculus as a framework for describing and analyzing electronic cash protocols, and we analyze Ferguson's electronic cash protocol as a case study. We believe that this approach is suitable for many different electronic cash protocols. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Luo, Z., Cai, X., Pang, J., & Deng, Y. (2007). Analyzing an electronic cash protocol using applied pi calculus. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4521 LNCS, pp. 87–103). Springer Verlag. https://doi.org/10.1007/978-3-540-72738-5_6
Mendeley helps you to discover research relevant for your work.