Probabilistic annotations for protocol models. Dedicated to Joshua Guttman
From MaRDI portal
Publication:2154019
Abstract: We describe how a probabilistic Hoare logic with localities can be used for reasoning about security. As a proof-of-concept, we analyze Vernam and El-Gamal cryptosystems, prove the security properties that they do satisfy and disprove those that they do not. We also consider a version of the Muddy Children puzzle, where children's trust and noise are taken into account.
Recommendations
Cites work
Cited in
(7)- Exogenous probabilistic computation tree logic
- Automata, Languages and Programming
- A logical approach to multilevel security of probabilistic systems
- A quantitative doxastic logic for probabilistic processes and applications to information-hiding
- scientific article; zbMATH DE number 4191559 (Why is no real title available?)
- Probabilistic relational Hoare logics for computer-aided security proofs
- Elementary probability theory in the Eindhoven style
This page was built for publication: Probabilistic annotations for protocol models. Dedicated to Joshua Guttman
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2154019)