Chapter 29: Analyses of other protocols

Abstract

This chapter introduces the modeling of other security protocols based on truly concurrent process algebra.

Keywords

Security Protocols; Process Algebra; True Concurrency

In this chapter, we will introduce some other useful security protocols, including secret splitting protocols in Section 29.1, bit commitment protocols in Section 29.2, and anonymous key distribution protocols in Section 29.3.

29.1 Analyses of secret splitting protocols

The hypothetical secret splitting protocol is shown in Fig. 29.1. Trent receives a message, splits this into four parts, and each part is sent to Alice, Bob, Carol, and Dave. Then, Trent gathers the four parts from Alice, Bob, Carol, and Dave, and combines them into a ...

Get Handbook of Truly Concurrent Process Algebra now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.