Let S = 〈L, S 〉 be a deductive system. An S-secrecy logic is a quadruple K = 〈FmL(V),K,B, S 〉, where FmL(V) is the algebra of L-formulas, K,B are S-theories, with B ⊆ K and S ⊆ K such that S ∩ B = ∅. K corresponds to information deducible from a knowledge base, B to information deducible from the publicly accessible (or browsable) part of the knowledge base and S is a secret set, a set of sensitive or private information that the knowledge base aims at concealing from its users. To provide models for this context, the notion of an S-secrecy structure is introduced. It is a quadruple A = 〈A,KA, BA, SA 〉, consisting of an L-algebra A, two S-filters KA, BA on A, with BA ⊆ KA, and a subset SA ⊆ KA, such that SA ∩ BA = ∅. Several model theoret...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
S. Fehr [11] pointed out that denoting the complement ΓA = ∆c A as honest (or good) players structur...
Babenyshev and Martins proved that two hidden multi-sorted deductive systems are deductively equival...
In recent work the notion of a secrecy logic S over a given deductive system S was introduced. Secre...
Privacy, copyright, security and other concerns make it essential for many distributed web applicati...
Abstract. Secrecy and authenticity properties of protocols are mutu-ally dependent: every authentica...
A model-theoretic approach can establish security theorems, which are formulas expressing authen-tic...
AbstractHidden k-logics can be considered as the underlying logics of program specification. They co...
This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prove...
Authentication and secrecy properties are proved by very different methods: the former by local reas...
In the spirit of Shannon s theory of secrecy systems we analyse several possible natural definitons ...
Homomorphic signatures are primitives that allow for public computations on authenticated data. At T...
AbstractIn this paper we investigate the applicability of a bottom-up evaluation strategy for a firs...
A distributed proof system is an effective way for deriving useful information by combining data fro...
The theory of relational parametricity and its logical relations proof technique are powerful tools ...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
S. Fehr [11] pointed out that denoting the complement ΓA = ∆c A as honest (or good) players structur...
Babenyshev and Martins proved that two hidden multi-sorted deductive systems are deductively equival...
In recent work the notion of a secrecy logic S over a given deductive system S was introduced. Secre...
Privacy, copyright, security and other concerns make it essential for many distributed web applicati...
Abstract. Secrecy and authenticity properties of protocols are mutu-ally dependent: every authentica...
A model-theoretic approach can establish security theorems, which are formulas expressing authen-tic...
AbstractHidden k-logics can be considered as the underlying logics of program specification. They co...
This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prove...
Authentication and secrecy properties are proved by very different methods: the former by local reas...
In the spirit of Shannon s theory of secrecy systems we analyse several possible natural definitons ...
Homomorphic signatures are primitives that allow for public computations on authenticated data. At T...
AbstractIn this paper we investigate the applicability of a bottom-up evaluation strategy for a firs...
A distributed proof system is an effective way for deriving useful information by combining data fro...
The theory of relational parametricity and its logical relations proof technique are powerful tools ...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
S. Fehr [11] pointed out that denoting the complement ΓA = ∆c A as honest (or good) players structur...
Babenyshev and Martins proved that two hidden multi-sorted deductive systems are deductively equival...