2000
DOI: 10.1007/3-540-44456-4_16
|View full text |Cite
|
Sign up to set email alerts
|

Exploring Fair Exchange Protocols Using Specification Animation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0
1

Year Published

2002
2002
2011
2011

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 4 publications
0
17
0
1
Order By: Relevance
“…One protocol was proposed by Zhou et al [25,26] and has already been analyzed and improved in [9]. The second protocol is a very similar one proposed by Kremer and Markowitch [14,17].…”
Section: Attacks On Two Non-repudiation Protocolsmentioning
confidence: 96%
See 1 more Smart Citation
“…One protocol was proposed by Zhou et al [25,26] and has already been analyzed and improved in [9]. The second protocol is a very similar one proposed by Kremer and Markowitch [14,17].…”
Section: Attacks On Two Non-repudiation Protocolsmentioning
confidence: 96%
“…After defining fair non-repudiation with timeliness we demonstrate attacks on two protocols for efficient fair nonrepudiation with timeliness. Some of these attacks are related to previously published ones [9,13]. Next, the design weaknesses enabling the attacks are discussed, and design principles to avoid these known attacks are proposed.…”
Section: Introductionmentioning
confidence: 98%
“…As already mentioned in the introduction, there are several attacks known on this kind of protocols [9], [10]. So, what is wrong with our analysis?…”
Section: Discussionmentioning
confidence: 92%
“…However, the problem is that we have to guarantee that a concrete implementation satisfies the (implicit) assumptions of our formalization. For instance, axiom (9) states that the recipient sends a receipt R after seeing the commitment C. In our formalization, there is no connection between R and C. So when A presents R to the judge to prove that she said a certain message, we implicitly assume that R and C match to the same message. A concrete implementation of the protocol has to guarantee this connection of R and C which is one of the attack points that has been exploited and that has to be addressed in a future extension of our logic.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation