A simpler framework based on the applied pi calculus and its application to electronic cash protocol

Xiaojuan Cai, Yuxin Deng

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We present a framework for describing and analyzing security protocols. It simplifies the applied pi calculus of Abadi and Fournet by moving away the infinite processes and the capability of transmitting channels in order to make the framework fit for describing practical protocols. An alternative operational semantics is given to make the framework more efficient when analyzing protocols. The semantics turns out to be well defined, since in this semantics labeled bisimilarity coincides with observational equivalence. We benefit from this result in analyzing the anonymity of an electronic cash protocol by the bisimulation method.

Original languageEnglish
Title of host publicationProceedings - International Symposium on Computer Science and Computational Technology, ISCSCT 2008
PublisherIEEE Computer Society
Pages87-90
Number of pages4
ISBN (Print)9780769534985
DOIs
StatePublished - 2008
Externally publishedYes
EventInternational Symposium on Computer Science and Computational Technology, ISCSCT 2008 - Shanghai, China
Duration: 20 Dec 200822 Dec 2008

Publication series

NameProceedings - International Symposium on Computer Science and Computational Technology, ISCSCT 2008
Volume2

Conference

ConferenceInternational Symposium on Computer Science and Computational Technology, ISCSCT 2008
Country/TerritoryChina
CityShanghai
Period20/12/0822/12/08

Keywords

  • Anonymity
  • Component: Applied pi calculus
  • Electronic cash protocol

Fingerprint

Dive into the research topics of 'A simpler framework based on the applied pi calculus and its application to electronic cash protocol'. Together they form a unique fingerprint.

Cite this