Accountability: definition and relationship to verifiability

R Küsters, T Truderung, A Vogt - … of the 17th ACM conference on …, 2010 - dl.acm.org
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting,
auction, identity-based encryption, and certain forms of secure multi-party computation …

Towards a theory of accountability and audit

R Jagadeesan, A Jeffrey, C Pitcher, J Riely - … Security–ESORICS 2009 …, 2009 - Springer
Accountability mechanisms, which rely on after-the-fact verification, are an attractive means
to enforce authorization policies. In this paper, we describe an operational model of …

Fair exchange

H Pagnia, H Vogt, FC Gärtner - The Computer Journal, 2003 - academic.oup.com
The growing importance of electronic commerce and the increasing number of applications
in this area has led research into studying methods of how to perform safe and secure online …

LTL model checking for security protocols

A Armando, R Carbone… - Journal of Applied Non …, 2009 - Taylor & Francis
Most model checking techniques for security protocols make a number of simplifying
assumptions on the protocol and/or on its execution environment that greatly complicate or …

Security protocol design via authentication tests

JD Guttman - Proceedings 15th IEEE Computer Security …, 2002 - ieeexplore.ieee.org
We describe a protocol design process, and illustrate its use by creating ATSPECT, an
authentication test-based secure protocol for electronic commerce transactions. The design …

Formal analysis of multiparty contract signing

R Chadha, S Kremer, A Scedrov - Journal of Automated Reasoning, 2006 - Springer
We analyze the multiparty contract-signing protocols of Garay and MacKenzie (GM) and of
Baum and Waidner (BW). We use a finite-state tool, M ocha, which allows specification of …

Three-valued abstractions of games: Uncertainty, but with precision

L De Alfaro, P Godefroid… - Proceedings of the 19th …, 2004 - ieeexplore.ieee.org
We present a framework for abstracting two-player turn-based games that preserves any
formula of the alternating/spl mu/-calculus (AMC). Unlike traditional conservative …

Analysis of probabilistic contract signing

G Norman, V Shmatikov - Journal of Computer Security, 2006 - content.iospress.com
We present three case studies, investigating the use of probabilistic model checking to
automatically analyse properties of probabilistic contract signing protocols. We use the …

Abuse-freeness in contract signing: a blockchain-based proposal

JL Ferrer-Gomila, MF Hinarejos - International Journal of Information …, 2024 - Springer
Electronic contract signing requires the design of protocols that guarantee that the exchange
is fair. In the past 5 years, we have observed that trusted third parties (TTPs) can be replaced …

Expressing receipt-freeness and coercion-resistance in logics of strategic ability: Preliminary attempt

M Tabatabaei, W Jamroga, PYA Ryan - … Workshop on AI for Privacy and …, 2016 - dl.acm.org
Voting is a mechanism of utmost importance to social processes. In this paper, we focus on
the strategic aspect of information security in voting procedures. We argue that the notions of …