Abstract
In some circumstances a party Q may have an incentive to perform Selective Denial of Service or Selective Delay of Service to other counter-parties in a protocol. That is, Q may use information at his disposal in order to selectively discriminate against certain service requests, for his own advantage. Q’s counter-parties may not necessarily be in a position to prove such malicious behavior by Q.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Anderson, R.J.: The Eternity Service. In: Proceedings of Pragocrypt 1996 (1996)
Asokan, N., Shoup, V., Waidner, M.: Optimistic Fair Exchange of Digital Signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 591–606. Springer, Heidelberg (1998)
Benaloh, J., Yung, M.: Distributing the Power of a Government to Enhance the Privacy of Voters. In: Proceedings of the 5th ACM Symposium on the Principles of Distributed Computing, pp. 52–62 (1986)
Chaum, D.: Security without Identification: Transaction Systems to Make Big Brother Obsolete. Communication of the ACM 28(10), 1030–1044 (1985)
Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Applications. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)
Gong, L., Lomas, T.M.A., Needham, R.M., Saltzer, J.H.: Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications 11(5), 648–656 (1993)
Lindell, Y., Lysyanskaya, A., Rabin, T.: On the Composition of Authenticated Byzantine Agreement. In: Proceedings of STOC 2002, Montreal, Canada (May 2002)
Mercuri, R.: The Electronic Voting Enigma: Hard Problems in Computer Science. Talk at The Cryptography and Information Security Group of MIT’s Laboratory for Computer Science (October 19, 2001)
Micali, S.: Certified E-mail with Invisible Post Offices. In: Talk at RSA Security Conference (1997)
Salanie, B.: The Economics of Contracts. MIT Press, Cambridge (1997)
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)
Yahalom, R.: Delegated Enforcement in Secure Protocols. In: 2nd Workshop on Issues in the Theory of Security, Portland, Oregon (January 2002), http://www.dsi.unive.it/IFIPWG1_7/WITS2002/prog/annotated_program.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yahalom, R. (2004). Protocols with Certified-Transfer Servers. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-39871-4_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20830-3
Online ISBN: 978-3-540-39871-4
eBook Packages: Springer Book Archive