Task-structured probabilistic I/O automata

R Canetti, L Cheung, D Kaynar… - … on Discrete Event …, 2006 - ieeexplore.ieee.org
Modeling frameworks such as probabilistic I/O automata (PIOA) and Markov decision
processes permit both probabilistic and nondeterministic choices. In order to use such …

Simulation based security in the applied pi calculus

S Delaune, S Kremer, O Pereira - Cryptology ePrint Archive, 2009 - eprint.iacr.org
We present a symbolic framework for refinement and composition of security protocols. The
framework uses the notion of ideal functionalities. These are abstract systems which are …

Task-structured probabilistic I/O automata

R Canetti, L Cheung, D Kaynar, M Liskov… - Journal of Computer and …, 2018 - Elsevier
Modeling frameworks such as Probabilistic I/O Automata (PIOA) and Markov Decision
Processes permit both probabilistic and nondeterministic choices. In order to use these …

Analyzing security protocols using time-bounded task-PIOAs

R Canetti, L Cheung, D Kaynar, M Liskov… - Discrete Event Dynamic …, 2008 - Springer
This paper presents the time-bounded task-PIOA modeling framework, an extension of the
probabilistic input/output automata (PIOA) framework that can be used for modeling and …

The Smart Contract Model

Y Amoussou-Guenou, M Herlihy… - … on Stabilizing, Safety …, 2024 - Springer
Many of the problems that arise in the context of blockchains and decentralized finance can
be seen as variations on classical problems of distributed computing. The smart contract …

Undecidability results for distributed probabilistic systems

S Giro - Brazilian Symposium on Formal Methods, 2009 - Springer
In the verification of concurrent systems involving probabilities, the aim is to find out the
maximum/minimum probability that a given event occurs (examples of such events being …

IPDL: A simple framework for formally verifying distributed cryptographic protocols

G Morrisett, E Shi, K Sojakova, X Fan… - Cryptology ePrint …, 2021 - eprint.iacr.org
Although there have been many successes in verifying proofs of non-interactive
cryptographic primitives such as encryption and signatures, formal verification of interactive …

Modeling computational security in long-lived systems

R Canetti, L Cheung, D Kaynar, N Lynch… - … on Concurrency Theory, 2008 - Springer
For many cryptographic protocols, security relies on the assumption that adversarial entities
have limited computational power. This type of security degrades progressively over the …

Brief announcement: Composable dynamic secure emulation

P Civit, M Potop-Butucaru - Proceedings of the 34th ACM Symposium on …, 2022 - dl.acm.org
This work extends the composable secure-emulation of Canetti et al. to dynamic settings.
Our work builds on top of dynamic probabilistic I/O automata, a recent framework introduced …

Brief Announcement: Probabilistic Dynamic Input/Output Automata

P Civit, M Potop-Butucaru - Proceedings of the 2022 ACM Symposium …, 2022 - dl.acm.org
We present probabilistic dynamic I/O automata, a framework to model dynamic probabilistic
systems. Our work extends dynamic I/O Automata formalism of Attie & Lynch to probabilistic …