2009 IEEE International Symposium on Parallel &Amp; Distributed Processing 2009
DOI: 10.1109/ipdps.2009.5161238
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of Micali's fair contract signing protocol by using Coloured Petri Nets : Multi-session case

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
2
2
1

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…In fact, our new attacks in TMN protocol are quite surprisingly since TMN have been analyzed quite extensively [9,11,13,18,[27][28]. Our preliminary results were reported in [21][22][23][24], but this paper extends our previous works by not only generalizing them into the two new techniques, which are the on-the-fly trace generation and the textual trace analysis, but also analyzing the comparative performance between the two trace generation methods.…”
Section: Introductionmentioning
confidence: 70%
See 3 more Smart Citations
“…In fact, our new attacks in TMN protocol are quite surprisingly since TMN have been analyzed quite extensively [9,11,13,18,[27][28]. Our preliminary results were reported in [21][22][23][24], but this paper extends our previous works by not only generalizing them into the two new techniques, which are the on-the-fly trace generation and the textual trace analysis, but also analyzing the comparative performance between the two trace generation methods.…”
Section: Introductionmentioning
confidence: 70%
“…For Micali's contract signing protocol, we found one new single-session attack [21] and two new multi-session attacks [22]. Also, we found three new attacks [22] of Bao et. al.…”
Section: Introductionmentioning
confidence: 71%
See 2 more Smart Citations
“…Recently in [16][17][18][19][20], our group has developed a new CPN method to analyze cryptographic protocols. Our methodology offers an efficient analysis of multiple attack traces, and is essentially independent of model checking tools for the full and explicit state space analysis.…”
Section: Introductionmentioning
confidence: 99%