DocumentCode :
2073127
Title :
Collusion analysis of cryptographic protocols
Author :
Low, Steven H. ; Maxemchuk, Nicholas F.
Author_Institution :
Dept. of Electr. & Electron. Eng., Melbourne Univ., Vic., Australia
Volume :
1
fYear :
1996
fDate :
18-22 Nov 1996
Firstpage :
1
Abstract :
As network applications such as electronic commerce proliferate, complex communications protocols that employ cryptographic building blocks, such as encryption and authentication, will become more common. We view a cryptographic protocol as a process by which information is transferred among some users and hidden from others. The collusion problem determines whether a subset of users can discover, through collusion, the information that is designed to be hidden from them after a protocol is executed. Earlier we introduced a model for cryptographic protocols and its collusion analysis, and solved a special case of the collusion problem. In this paper we present an algorithm that solves the general case
Keywords :
cryptography; message authentication; protocols; telecommunication networks; algorithm; authentication; collusion analysis; collusion problem; communications protocols; cryptographic building blocks; cryptographic protocols; electronic commerce; encryption; network applications; Business; Context; Credit cards; Cryptographic protocols; Cryptography; Data security; Graphics; Insurance; Privacy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Telecommunications Conference, 1996. GLOBECOM '96. 'Communications: The Key to Global Prosperity
Conference_Location :
London
Print_ISBN :
0-7803-3336-5
Type :
conf
DOI :
10.1109/GLOCOM.1996.594324
Filename :
594324
Link To Document :
بازگشت