Tidy: Symbolic verification of timed cryptographic protocols

G Barthe, U Dal Lago, G Malavolta… - Proceedings of the 2022 …, 2022 - dl.acm.org
… The first rule models the correctness of commitments: opening … to prove fairness towards𝐴,
as well as properties of other … -order linear temporal logics. In International Symposium on …

APROVER: A Framework For The Development Of Security Protocols

M Lilli - 2024 - air.unimi.it
… of advanced cryptographic protocols becomes essential for … To ensure that mathematical
proofs of correctness, secrecy, … property for a specific protocol and attempt to construct proof

[PDF][PDF] Secure and guarantee QoS in a video sequence: a new approach based on TLS protocol to secure data and RTP to ensure real-time exchanges

H Touil, N El Akkad, K Satori - Int. J. Saf. Secur. Eng, 2021 - iieta.org
… the AES key (Advanced Encryption Standard), including the … technical and legal framework
that guarantees adequate data … match the website's name, the validity date of the certificate, …

Tempora-Fusion: Time-Lock Puzzle with Efficient Verifiable Homomorphic Linear Combination

A Abadi - arXiv preprint arXiv:2406.15070, 2024 - arxiv.org
… This scheme avoids asymmetric-key cryptography for verifica… the ability to verify the correctness
of the computation result. … E to check the validity of the solution and proof provided by A. …

Hash-chain fog/edge: A mode-based hash-chain for secured mutual authentication protocol using zero-knowledge proofs in fog/edge

MS Pardeshi, RK Sheu, SM Yuan - Sensors, 2022 - mdpi.com
… -knowledge proof is a precise scheme that provides the validity of … The cryptographic protocols
can be significantly evaluated … K a b ′ are temporal session keys used in the subsequent …

Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication

JJ Puthiyidam, S Joseph, B Bhushan - Computer Communications, 2024 - Elsevier
… The signature proof is generated differently at each … systems by leveraging the cryptographic
properties of ECC and … ZKP allow for verifying the validity of a statement without revealing …

LDES: detector design for version number attack detection using linear temporal logic based on discrete event system

AD Seth, S Biswas, AK Dhar - International Journal of Information Security, 2023 - Springer
… the DVN, such as cryptographic techniques, trust-based, … , is unable to guarantee its
correctness. This paper proposes … As a result, proving the IDS’s correctness becomes a difficult …

[HTML][HTML] A novel formal logic for formal analysis of timeliness in non-repudiation protocols

K Yang, M Xiao, X Zhong, Y Zhong - … of King Saud University-Computer and …, 2023 - Elsevier
… Therefore, before a protocol is widely used, its correctness and … -order predicate logic and
cryptographic primitives and other … the temporal sequence of the actions performed by protocol

A novel blockchain and Bi-linear polynomial-based QCP-ABE framework for privacy and security over the complex cloud data

KK Singamaneni, K Ramana, G Dhiman, S Singh… - Sensors, 2021 - mdpi.com
… who will become the temporary owner of the ciphered key to … cryptographic models we
replaced advanced Attribute Based … results proved that our approach has the finest accuracy and …

Foundational Integration Verification of a Cryptographic Server

A Erbsen, J Philipoom, D Jamner, A Lin… - Proceedings of the …, 2024 - dl.acm.org
… and eventually inspired by the temporal-logic operators □ and … a unified proof of a large
family of cryptographic protocols, … just of functional correctness but also of cryptographic protocol