dc.contributor.advisor | Nancy Lynch | |
dc.contributor.author | Canetti, Ran | |
dc.contributor.author | Cheung, Ling | |
dc.contributor.author | Kaynar, Dilsun | |
dc.contributor.author | Liskov, Moses | |
dc.contributor.author | Lynch, Nancy | |
dc.contributor.author | Pereira, Olivier | |
dc.contributor.author | Segala, Roberto | |
dc.contributor.other | Theory of Computation | |
dc.date.accessioned | 2007-02-20T13:41:48Z | |
dc.date.available | 2007-02-20T13:41:48Z | |
dc.date.issued | 2007-02-16 | |
dc.identifier.other | MIT-CSAIL-TR-2007-011 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/35918 | |
dc.description.abstract | The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about their correctness using multiple levels of abstraction, based on implementation relationships between these levels. We enhance this framework to allow analyzing protocols that use cryptographic primitives. This requires resolving and reconciling issues such as nondeterministic behavior and scheduling, randomness, resource-bounded computation, and computational hardness assumptions. The enhanced framework allows for more rigorous and systematic analysis of cryptographic protocols. To demonstrate the use of this framework, we present an example analysis that we have done for an Oblivious Transfer protocol. | |
dc.format.extent | 98 p. | |
dc.relation.ispartofseries | Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory | |
dc.relation.replaces | http://hdl.handle.net/1721.1/33217 | |
dc.relation.uri | http://hdl.handle.net/1721.1/33217 | |
dc.title | Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol | |