Sciweavers

CCS
2010
ACM

Cap unification: application to protocol security modulo homomorphic encryption

13 years 1 months ago
Cap unification: application to protocol security modulo homomorphic encryption
We address the insecurity problem for cryptographic protocols, for an active intruder and a bounded number of sessions. The protocol steps are modeled as rigid Horn clauses, and the intruder abilities as an equational theory. The problem of active intrusion
Siva Anantharaman, Hai Lin, Christopher Lynch, Pal
Added 28 Feb 2011
Updated 28 Feb 2011
Type Journal
Year 2010
Where CCS
Authors Siva Anantharaman, Hai Lin, Christopher Lynch, Paliath Narendran, Michaël Rusinowitch
Comments (0)