MPI-INF Logo
Campus Event Calendar

Event Entry

What and Who

Constraint Solving for Contract-Signing Protocols

Ralf Kuesters
Uni Kiel
Talk
AG 1, AG 2, AG 3, AG 4, AG 5  
Expert Audience

Date, Time and Location

Wednesday, 22 March 2006
10:00
-- Not specified --
E1 4
021
Saarbrücken

Abstract


The design of cryptographic protocols is highly error-prone, which makes formal
analysis of such protocols indispensable. For authentication and key exchange
protocols various methods and tools for fully automatic analysis are available.
The security of such protocols can be stated in terms of reachability
properties on typically infinite graphs.  However, for a broad class of
protocols, including contract signing protocols, the security requirements are
more complex and are stated in terms of game-theoretic notions. Up until
recently, nothing was known about the automatic analysis of such protocols.

In this talk, I will first provide an overview on the automatic analysis of
cryptographic protocols and introduce the basic protocol and intruder models. I
will then present new results on the automatic analysis of cryptographic
protocols with game-theoretic security requirements, including a decision
procedure based on the technique of constraint solving.

This talk is based on joint work with Detlef Kaehler and Thomas Wilke presented
at STACS 2005 and CONCUR 2005.



Contact

Michael Backes
--email hidden
passcode not visible
logged in users only

Brigitta Hansen, 03/20/2006 11:15
Brigitta Hansen, 03/20/2006 11:13 -- Created document.