Abstract | ||
---|---|---|
Untraceabilityand unreuseabilityare essential security properties for electronic cash protocols. Many protocols have been proposed to meet these two properties. However, most of them have not been formally proved to be untraceable and unreuseable. In this paper we propose to use the applied pi calculus as a framework for describing and analyzing electronic cash protocols, and we analyze Ferguson's electronic cash protocol as a case study. We believe that this approach is suitable for many different electronic cash protocols. |
Year | DOI | Venue |
---|---|---|
2007 | 10.1007/978-3-540-72738-5_6 | ACNS |
Keywords | Field | DocType |
electronic cash protocol,applied pi calculus,untraceabilityand unreuseabilityare essential security,case study,different electronic cash protocol | Cryptographic protocol,Pi calculus,Computer science,Computer security,Electronic cash,Theoretical computer science,Security properties,Blind signature,Equational theory | Conference |
Volume | ISSN | Citations |
4521 | 0302-9743 | 8 |
PageRank | References | Authors |
0.50 | 26 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Zhengqin Luo | 1 | 47 | 4.17 |
Xiaojuan Cai | 2 | 36 | 5.95 |
Jun Pang | 3 | 521 | 30.59 |
Yuxin Deng | 4 | 413 | 30.41 |