نتایج جستجو برای: applied pi calculus
تعداد نتایج: 666487 فیلتر نتایج به سال:
In this paper, we give an abstraction of multi-secret sharing schemes based on lagrange interpolating polynomial that is accessible to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using an equational theory that abstractly characterizes the cryptographic semantics of secret share. Based on that, we verify the threshold certificate protocol in a conve...
We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) su ces for some abstract protocols; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as ...
Do you know what the pi calculus is? It is a language invented ten years ago for describing concurrent and distributed systems. It has come to dominate theoretical research into concurrency and distribution, and now its time has come to be used in practice. The author, along with Laneve and Gardner, has recently developed a distributed virtual machine [10, 12, 2] for the pi calculus. This is ne...
In this paper we design an e-voting protocol for an academic voting system which should be independent from other university applications. We briefly discuss security requirements for e-voting schemes focusing on our proposed scheme. We design a receipt-free e-voting protocol which requires neither anonymous channel nor other physical assumptions. We give a short survey on formal analysis of e-...
We extended the PayWord scheme, it supports shopping at multiple vendors without an on-line broker or an on-line secure database. The proposed credit-based system uses one hash chain, hence besides the secret signature key only the seed and a random value should be securely stored. Our scheme is analyzed in applied pi calculus, we prove that it fulfills payment approval, secure payment authoriz...
This paper presents an analysis of biometric authentication for signature creation application. We extend the established protocol in order to verify the two properties: secrecy and safety. We have analysed the protocol using applied pi calculus and ProVerif. The verification of the secrecy property shows that the protocol holds the biometric data securely while the verification of the safety p...
We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mechanized analysis. This abstraction is formalized within the applied pi-calculus by using an equational theory which characterizes the cryptographic semantics of secret share. We also present an encoding from the equational theory into a convergent rewriting system, which is suitable for the automa...
Pi is a system for the interactive construction and editing of formal derivations in the calculus of finitary partial inductive definitions. This calculus can be used as a logical framework where object logics are specified, turning Pi into a derivation system for a particular object logic. Noteworthy features of Pi include: a graphic user interface where derivations are presented in tree form,...
In this paper, we consider a problem in calculus of variations motivated by quantitative isoperimetric inequality the plane. More precisely, aim article is computation minimum variational $$\begin{aligned}\inf _{u\in {\mathcal {W}}} \frac{\displaystyle \int _{-\pi }^{\pi }[(u')^2-u^2]d\theta }{\displaystyle \left[ } |u| d\theta \right] ^2} \end{aligned}$$ where function $$u\in {W}}$$ $$H^1(-\pi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید