Deconstructing Alice and Bob

نویسندگان

  • Carlos Caleiro
  • Luca Viganò
  • David A. Basin
چکیده

We show that, despite the fact that Alice&Bob;–notation does not include explicit control flowconstructs, it is possible to make some of these aspects explicit and thus produce formal protocolmodels without having to resort to more expressive protocol description languages. We introducea notion of incremental symbolic runs to formally handle message forwarding and conditionalabortion. In these runs, we use variables to represent messages that the principals cannot read, andwe characterize each of the execution steps in order to build a collection of “symbolic subruns” ofincreasing lengths, reflecting the data possessed by the principals up to that point in the execution.We contrast this with the simpler (more standard) approach based on formalizing the behavior ofprincipals by directly interpreting message exchanges as sequences of atomic actions. In particular,we provide a complete characterization of the situations where this simpler approach is adequateand prove that incremental symbolic runs are more expressive in general.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practice Problems Cryptography and Network Security

(a) Alice and Bob wish to resolve a dispute over telephone. We can encode the possibilities of the dispute by a binary value. For this they engage a protocol: i. Alice → Bob: Alice picks up randomly an x, which is a 200 bit number and computes the function f(x). Alice sends f(x) to Bob. ii. Bob → Alice: Bob tells Alice whether x was even or odd. iii. Alice → Bob: Alice then sends x to Bob, so t...

متن کامل

Seminar projects proposals Fall 2017

Introduced in 2009 in [6] bitcoin is one of the first decentralized currency. It’s called crypto-currency, since it uses cryptography to secure transactions and assets. Bitcoin operation is based on so-called public ledgers that can be shortly described as follows. Assume there are two parties Alice and Bob (as usual), such that Alice wants to buy something from Bob. Assume they both have walle...

متن کامل

The space complexity of mirror games

We consider a simple streaming game between two players Alice and Bob, which we call the mirror game. In this game, Alice and Bob take turns saying numbers belonging to the set {1, 2, . . . , 2N}. A player loses if they repeat a number that has already been said. Bob, who goes second, has a very simple (and memoryless) strategy to avoid losing: whenever Alice says x, respond with 2N+1−x. The qu...

متن کامل

Identity-Based Decryption

Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob the resulting ciphertext, which Bob can send to the trusted authority. The trusted authority provides Bob the symmetric key only upon verifying Bob’s identity. 1 Identity-Based Encryption Shamir introduced [7] the notio...

متن کامل

1 S

The protocol is, however, susceptible to a man-in-the-middle attack [3], in which the adversary (Eve) intercepts a message from Alice and creates a new message to send to Bob (Fig.1). Eve performs the exchange with Alice using the original message, while Bob performs the exchange using the newly created message. At the final stage, Eve has the original message in decrypted form, while Bob has t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Electr. Notes Theor. Comput. Sci.

دوره 135  شماره 

صفحات  -

تاریخ انتشار 2005