Abstract
The paper deals with automated methods for the design of security protocols and their design using zero knowledge protocols, or protocols, where it is possible to use zero knowledge protocols such as subprotocols.. Specific emphasis is placed on the use of compositional method. The paper also include the example of protocol design.
Chapter PDF
Similar content being viewed by others
References
Safar, J.: Zero-knowledge protocol design, Master’s thesis, FIT Brno University of Technology, Brno, Supervisor: Pavel Ocenasek (2010)
Choi, H.-J.: Security protocol design by composition. Technical report, University of Cambridge (2006)
Fiege, U., Fiat, A., Shamir, A.: Zero knowledge proofs of identity. In: STOC 1987: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, pp. s.210–s.217. ACM, New York (1987) ISBN 0-89791-221-7
Rosen, A., Goldreich, O.: Concurrent Zero-Knowledge. Springer, Heidelberg (2006) ISBN 3-540-32938-2
Simari, G.I.: A Primer on Zero Knowledge Protocols (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pavel, O. (2011). An Approach for Security Protocol Design Based on Zero-Knowledge Primitives Composition. In: Smith, M.J., Salvendy, G. (eds) Human Interface and the Management of Information. Interacting with Information. Human Interface 2011. Lecture Notes in Computer Science, vol 6771. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21793-7_42
Download citation
DOI: https://doi.org/10.1007/978-3-642-21793-7_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21792-0
Online ISBN: 978-3-642-21793-7
eBook Packages: Computer ScienceComputer Science (R0)