Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automataframework of Lynch, Segala, and Vaandrager. This framework providestools for arguing rigorously about the concurrency and schedulingaspects of protocols, and about protocols p...
Main Authors: | Canetti, Ran, Cheung, Ling, Kaynar, Dilsun, Liskov, Moses, Lynch, Nancy, Pereira, Olivier, Segala, Roberto |
---|---|
Other Authors: | Nancy Lynch |
Language: | en_US |
Published: |
2006
|
Online Access: | http://hdl.handle.net/1721.1/33154 |
Similar Items
-
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
by: Canetti, Ran, et al.
Published: (2005) -
Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
by: Canetti, Ran, et al.
Published: (2007) -
Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
by: Canetti, Ran, et al.
Published: (2006) -
Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
by: Canetti, Ran, et al.
Published: (2006) -
Task-Structured Probabilistic I/O Automata
by: Canetti,, Ran, et al.
Published: (2006)