Mechanized analysis of verifiable multi-secret sharing in the appliedPi-calculus

Hui Zhao, Mingchu Li, Kouichi Sakurai, Yizhi Ren

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

In this paper, we give an abstraction of verifiable multi-secret sharingschemes that is accessible to a, fully mechanized analysis. The abstraction isformalized, within the applied, pi-calculus using an equational theory thatabstractly characterizes the cryptographic semantics of secret share. Based onthat, we verify the threshold certificate protocol in a convergent rewritingsystem suitable for the automated protocol verifier Pro Verif. ICIC International

Original languageEnglish
Pages (from-to)1053-1058
Number of pages6
JournalICIC Express Letters
Volume4
Issue number3
Publication statusPublished - Jun 2010

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Mechanized analysis of verifiable multi-secret sharing in the appliedPi-calculus'. Together they form a unique fingerprint.

Cite this