Analyzing an Electronic Cash Protocol Using Applied Pi Calculus

  • Authors:
  • Zhengqin Luo;Xiaojuan Cai;Jun Pang;Yuxin Deng

  • Affiliations:
  • BASICS, Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China;BASICS, Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China;Carl von Ossietzky Universität Oldenburg, Department für Informatik, 26111 Oldenburg, Germany;BASICS, Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China

  • Venue:
  • ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Untraceabilityand unreuseabilityare essential security properties for electronic cash protocols. Many protocols have been proposed to meet these two properties. However, most of them have not been formally proved to be untraceable and unreuseable. In this paper we propose to use the applied pi calculus as a framework for describing and analyzing electronic cash protocols, and we analyze Ferguson's electronic cash protocol as a case study. We believe that this approach is suitable for many different electronic cash protocols.