Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automata frameworkof Lynch, Segala, and Vaandrager.This framework provides tools for arguing rigorously about theconcurrency and scheduling aspects of protocols, and about protocolspr...
Main Authors: | Canetti, Ran, Cheung, Ling, Kaynar, Dilsun, Liskov, Moses, Lynch, Nancy, Olivier, Segala, Roberto |
---|---|
Other Authors: | Theory of Distributed Systems |
Language: | en_US |
Published: |
2005
|
Online Access: | http://hdl.handle.net/1721.1/30566 |
Similar Items
-
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
by: Canetti, Ran, et al.
Published: (2006) -
Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
by: Canetti, Ran, et al.
Published: (2006) -
Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
by: Canetti, Ran, et al.
Published: (2006) -
Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
by: Canetti, Ran, et al.
Published: (2007) -
Task-Structured Probabilistic I/O Automata
by: Canetti, Ran, et al.
Published: (2006)