Abstract
In this paper, we give an abstraction of verifiable multi-secret sharingschemes that is accessible to a, fully mechanized analysis. The abstraction isformalized, within the applied, pi-calculus using an equational theory thatabstractly characterizes the cryptographic semantics of secret share. Based onthat, we verify the threshold certificate protocol in a convergent rewritingsystem suitable for the automated protocol verifier Pro Verif. ICIC International
Original language | English |
---|---|
Pages (from-to) | 1053-1058 |
Number of pages | 6 |
Journal | ICIC Express Letters |
Volume | 4 |
Issue number | 3 |
Publication status | Published - Jun 2010 |
All Science Journal Classification (ASJC) codes
- Control and Systems Engineering
- Computer Science(all)