TY - GEN
T1 - Security protocols for secret Santa
AU - Mauw, Sjouke
AU - Radomirović, Saša
AU - Ryan, Peter Y. A.
PY - 2014
Y1 - 2014
N2 - The motivation for the current report lies in a number of questions concerning the current state of the art in security protocol design and analysis. Why is it so hard to develop a complete set of security requirements for a particular problem? For instance, even in the seemingly simple case of defining the secrecy property of an encryption algorithm it has taken decades to reach a degree of consensus, and even now new definitions are required in specific contexts. Similarly, even after more than twenty years of research on e-voting, there is still a lack of consensus as to which properties an e-voting protocol should satisfy. What did we learn from this research experience on e-voting? Can we apply the knowledge accumulated in this domain to similar domains and problems? Is there a methodology underlying the process of understanding a security protocol domain?
AB - The motivation for the current report lies in a number of questions concerning the current state of the art in security protocol design and analysis. Why is it so hard to develop a complete set of security requirements for a particular problem? For instance, even in the seemingly simple case of defining the secrecy property of an encryption algorithm it has taken decades to reach a degree of consensus, and even now new definitions are required in specific contexts. Similarly, even after more than twenty years of research on e-voting, there is still a lack of consensus as to which properties an e-voting protocol should satisfy. What did we learn from this research experience on e-voting? Can we apply the knowledge accumulated in this domain to similar domains and problems? Is there a methodology underlying the process of understanding a security protocol domain?
UR - http://www.scopus.com/inward/record.url?scp=84915818746&partnerID=8YFLogxK
U2 - 10.1007/978-3-662-45921-8_26
DO - 10.1007/978-3-662-45921-8_26
M3 - Conference contribution
AN - SCOPUS:84915818746
SN - 9783662459201
T3 - Lecture Notes in Computer Science
SP - 175
EP - 184
BT - Security Protocols XVIII
A2 - Christianson, Bruce
A2 - Malcolm, James
PB - Springer
T2 - 18th International Workshop Security Protocols 2010
Y2 - 24 March 2010 through 26 March 2010
ER -