Analyzing an electronic cash protocol using applied pi calculus

  • Zhengqin Luo*
  • , Xiaojuan Cai
  • , Jun Pang
  • , Yuxin Deng
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

Untraceability and unreuseability are essential security properties for electronic cash protocols. Many protocols have been proposed to meet these two properties. However, most of them have not been formally proved to be untraceable and unreuseable. In this paper we propose to use the applied pi calculus as a framework for describing and analyzing electronic cash protocols, and we analyze Ferguson's electronic cash protocol as a case study. We believe that this approach is suitable for many different electronic cash protocols.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 5th International Conference, ACNS 2007, Proceedings
PublisherSpringer Verlag
Pages87-103
Number of pages17
ISBN (Print)9783540727378
DOIs
StatePublished - 2007
Externally publishedYes
Event5th International Conference on Applied Cryptography and Network Security, ACNS 2007 - Zhuhai, China
Duration: 5 Jun 20078 Jun 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4521 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Conference on Applied Cryptography and Network Security, ACNS 2007
Country/TerritoryChina
CityZhuhai
Period5/06/078/06/07

Fingerprint

Dive into the research topics of 'Analyzing an electronic cash protocol using applied pi calculus'. Together they form a unique fingerprint.

Cite this