{"id":"https://openalex.org/W2098540721","doi":"https://doi.org/10.1145/1069774.1069776","title":"A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures","display_name":"A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures","publication_year":2005,"publication_date":"2005-07-11","ids":{"openalex":"https://openalex.org/W2098540721","doi":"https://doi.org/10.1145/1069774.1069776","mag":"2098540721"},"language":"en","primary_location":{"id":"doi:10.1145/1069774.1069776","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1069774.1069776","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070402905","display_name":"V\u00e9ronique Cortier","orcid":null},"institutions":[{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"V\u00e9ronique Cortier","raw_affiliation_strings":["LORIA, Nancy, France"],"affiliations":[{"raw_affiliation_string":"LORIA, Nancy, France","institution_ids":["https://openalex.org/I4210121838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109895336","display_name":"Micha\u00ebl Rusinowitch","orcid":null},"institutions":[{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Michael Rusinowitch","raw_affiliation_strings":["LORIA, Nancy, France"],"affiliations":[{"raw_affiliation_string":"LORIA, Nancy, France","institution_ids":["https://openalex.org/I4210121838"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083266867","display_name":"Eugen Z\u0103linescu","orcid":"https://orcid.org/0000-0002-2312-5661"},"institutions":[{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Eugen Z\u01celinescu","raw_affiliation_strings":["LORIA, Nancy, France"],"affiliations":[{"raw_affiliation_string":"LORIA, Nancy, France","institution_ids":["https://openalex.org/I4210121838"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5070402905"],"corresponding_institution_ids":["https://openalex.org/I4210121838"],"apc_list":null,"apc_paid":null,"fwci":1.3679,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.84638478,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"12","last_page":"22"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptographic-nonce","display_name":"Cryptographic nonce","score":0.8634101152420044},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.675127387046814},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6487895250320435},{"id":"https://openalex.org/keywords/decidability","display_name":"Decidability","score":0.6317999362945557},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6294085383415222},{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.6143641471862793},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5599809885025024},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5359799265861511},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.49657970666885376},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2819299101829529}],"concepts":[{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.8634101152420044},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.675127387046814},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6487895250320435},{"id":"https://openalex.org/C153269930","wikidata":"https://www.wikidata.org/wiki/Q430001","display_name":"Decidability","level":2,"score":0.6317999362945557},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6294085383415222},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.6143641471862793},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5599809885025024},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5359799265861511},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.49657970666885376},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2819299101829529}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1069774.1069776","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1069774.1069776","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:inria-00000557v1","is_oa":false,"landing_page_url":"https://inria.hal.science/inria-00000557","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"7th ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming - PPDP'05, Jul 2005, Lisbonne/Portugal, pp.12-22","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2781650","https://openalex.org/W170425430","https://openalex.org/W1479744988","https://openalex.org/W1511345178","https://openalex.org/W1513576223","https://openalex.org/W1515715680","https://openalex.org/W1521664307","https://openalex.org/W1544182777","https://openalex.org/W1585638454","https://openalex.org/W1619409532","https://openalex.org/W1836114257","https://openalex.org/W1871114411","https://openalex.org/W1944323241","https://openalex.org/W2003593381","https://openalex.org/W2108533001","https://openalex.org/W2138622650","https://openalex.org/W2146973388","https://openalex.org/W2155032609","https://openalex.org/W2561675875"],"related_works":["https://openalex.org/W2951181267","https://openalex.org/W2407726188","https://openalex.org/W3210000570","https://openalex.org/W4302854873","https://openalex.org/W3216230948","https://openalex.org/W1593404714","https://openalex.org/W3030044402","https://openalex.org/W2585563416","https://openalex.org/W1515715680","https://openalex.org/W2612627043"],"abstract_inverted_index":{"Formal":[0],"methods":[1],"have":[2],"proved":[3],"to":[4,17,46,107,118],"be":[5,119],"very":[6],"useful":[7],"for":[8,75,96],"analyzing":[9],"cryptographic":[10,35,79],"protocols.":[11],"However,":[12],"most":[13],"existing":[14],"techniques":[15],"apply":[16,104],"the":[18,109],"case":[19],"of":[20,51,57,63,78,85,91],"abstract":[21],"encryption":[22,39,99],"schemes":[23],"and":[24,40,87,100],"pairing.":[25],"In":[26],"this":[27,58,105],"paper,":[28],"we":[29,69],"consider":[30],"more":[31],"complex,":[32],"less":[33],"studied":[34],"primitives":[36],"like":[37],"CBC":[38,98,122],"blind":[41,101],"signatures.":[42,102],"This":[43],"leads":[44],"us":[45],"introduce":[47],"a":[48,61,67,71,76,88],"new":[49,72],"fragment":[50,59],"Horn":[52],"clauses.":[53],"We":[54,103],"show":[55],"decidability":[56,73],"using":[60],"combination":[62],"several":[64],"resolution":[65],"strategies.As":[66],"consequence,":[68],"obtain":[70],"result":[74,106],"class":[77],"protocols":[80],"(with":[81],"an":[82],"unbounded":[83],"number":[84,90],"sessions":[86],"bounded":[89],"nonces)":[92],"that":[93],"may":[94],"use":[95],"example":[97],"fix":[108],"Needham-Schroeder":[110],"symmetric":[111],"key":[112],"authentication":[113],"protocol,":[114],"which":[115],"is":[116,124],"known":[117],"flawed":[120],"when":[121],"mode":[123],"used.":[125]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
