Mechanized analysis of verifiable multi-secret sharing in the appliedPi-calculus

Hui Zhao, Mingchu Li, Kouichi Sakurai, Yizhi Ren

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

In this paper, we give an abstraction of verifiable multi-secret sharingschemes that is accessible to a, fully mechanized analysis. The abstraction isformalized, within the applied, pi-calculus using an equational theory thatabstractly characterizes the cryptographic semantics of secret share. Based onthat, we verify the threshold certificate protocol in a convergent rewritingsystem suitable for the automated protocol verifier Pro Verif. ICIC International

Original languageEnglish
Pages (from-to)1053-1058
Number of pages6
JournalICIC Express Letters
Volume4
Issue number3
Publication statusPublished - Jun 2010

Fingerprint

Semantics

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Control and Systems Engineering

Cite this

Mechanized analysis of verifiable multi-secret sharing in the appliedPi-calculus. / Zhao, Hui; Li, Mingchu; Sakurai, Kouichi; Ren, Yizhi.

In: ICIC Express Letters, Vol. 4, No. 3, 06.2010, p. 1053-1058.

Research output: Contribution to journalArticle

Zhao, Hui ; Li, Mingchu ; Sakurai, Kouichi ; Ren, Yizhi. / Mechanized analysis of verifiable multi-secret sharing in the appliedPi-calculus. In: ICIC Express Letters. 2010 ; Vol. 4, No. 3. pp. 1053-1058.
@article{48902aed26fe4b36bac3ce0d186dcbe2,
title = "Mechanized analysis of verifiable multi-secret sharing in the appliedPi-calculus",
abstract = "In this paper, we give an abstraction of verifiable multi-secret sharingschemes that is accessible to a, fully mechanized analysis. The abstraction isformalized, within the applied, pi-calculus using an equational theory thatabstractly characterizes the cryptographic semantics of secret share. Based onthat, we verify the threshold certificate protocol in a convergent rewritingsystem suitable for the automated protocol verifier Pro Verif. ICIC International",
author = "Hui Zhao and Mingchu Li and Kouichi Sakurai and Yizhi Ren",
year = "2010",
month = "6",
language = "English",
volume = "4",
pages = "1053--1058",
journal = "ICIC Express Letters",
issn = "1881-803X",
publisher = "ICIC Express Letters Office",
number = "3",

}

TY - JOUR

T1 - Mechanized analysis of verifiable multi-secret sharing in the appliedPi-calculus

AU - Zhao, Hui

AU - Li, Mingchu

AU - Sakurai, Kouichi

AU - Ren, Yizhi

PY - 2010/6

Y1 - 2010/6

N2 - In this paper, we give an abstraction of verifiable multi-secret sharingschemes that is accessible to a, fully mechanized analysis. The abstraction isformalized, within the applied, pi-calculus using an equational theory thatabstractly characterizes the cryptographic semantics of secret share. Based onthat, we verify the threshold certificate protocol in a convergent rewritingsystem suitable for the automated protocol verifier Pro Verif. ICIC International

AB - In this paper, we give an abstraction of verifiable multi-secret sharingschemes that is accessible to a, fully mechanized analysis. The abstraction isformalized, within the applied, pi-calculus using an equational theory thatabstractly characterizes the cryptographic semantics of secret share. Based onthat, we verify the threshold certificate protocol in a convergent rewritingsystem suitable for the automated protocol verifier Pro Verif. ICIC International

UR - http://www.scopus.com/inward/record.url?scp=77953903598&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77953903598&partnerID=8YFLogxK

M3 - Article

VL - 4

SP - 1053

EP - 1058

JO - ICIC Express Letters

JF - ICIC Express Letters

SN - 1881-803X

IS - 3

ER -