{"id":"https://openalex.org/W4308361275","doi":"https://doi.org/10.1145/3548606.3559343","title":"Tidy: Symbolic Verification of Timed Cryptographic Protocols","display_name":"Tidy: Symbolic Verification of Timed Cryptographic Protocols","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308361275","doi":"https://doi.org/10.1145/3548606.3559343"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3559343","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3559343","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559343","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559343","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075577852","display_name":"Gilles Barthe","orcid":"https://orcid.org/0000-0002-3853-1777"},"institutions":[{"id":"https://openalex.org/I4210096592","display_name":"Max Planck Institute for Security and Privacy","ror":"https://ror.org/00bj0r217","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210096592"]},{"id":"https://openalex.org/I4210087817","display_name":"Software (Germany)","ror":"https://ror.org/004g36n56","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210087817"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Gilles Barthe","raw_affiliation_strings":["MPI-SP &amp; IMDEA Software Institute, Bochum, Germany","MPI Security and Privacy - Max Planck Institute for Security and Privacy [Bochum] (Germany)"],"affiliations":[{"raw_affiliation_string":"MPI-SP &amp; IMDEA Software Institute, Bochum, Germany","institution_ids":["https://openalex.org/I4210087817","https://openalex.org/I4210096592"]},{"raw_affiliation_string":"MPI Security and Privacy - Max Planck Institute for Security and Privacy [Bochum] (Germany)","institution_ids":["https://openalex.org/I4210096592"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084450516","display_name":"Ugo Dal Lago","orcid":"https://orcid.org/0000-0001-9200-070X"},"institutions":[{"id":"https://openalex.org/I9360294","display_name":"University of Bologna","ror":"https://ror.org/01111rn36","country_code":"IT","type":"education","lineage":["https://openalex.org/I9360294"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Ugo Dal Lago","raw_affiliation_strings":["University of Bologna &amp; INRIA Sophia Antipolis, Bologna, Germany","FOCUS - Foundations of Component-based Ubiquitous Systems (Dipartimento di Informatica - Scienza e Ingegneria (DISI)\r\nUniversita' di Bologna\r\nMura Anteo Zamboni, 7\r\n40126 Bologna\r\nITALY - Italy)"],"affiliations":[{"raw_affiliation_string":"University of Bologna &amp; INRIA Sophia Antipolis, Bologna, Germany","institution_ids":[]},{"raw_affiliation_string":"FOCUS - Foundations of Component-based Ubiquitous Systems (Dipartimento di Informatica - Scienza e Ingegneria (DISI)\r\nUniversita' di Bologna\r\nMura Anteo Zamboni, 7\r\n40126 Bologna\r\nITALY - Italy)","institution_ids":["https://openalex.org/I9360294"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007500399","display_name":"Giulio Malavolta","orcid":"https://orcid.org/0009-0009-9737-0094"},"institutions":[{"id":"https://openalex.org/I4210096592","display_name":"Max Planck Institute for Security and Privacy","ror":"https://ror.org/00bj0r217","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210096592"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Giulio Malavolta","raw_affiliation_strings":["MPI-SP, Bochum, Germany","MPI Security and Privacy - Max Planck Institute for Security and Privacy [Bochum] (Germany)"],"affiliations":[{"raw_affiliation_string":"MPI-SP, Bochum, Germany","institution_ids":["https://openalex.org/I4210096592"]},{"raw_affiliation_string":"MPI Security and Privacy - Max Planck Institute for Security and Privacy [Bochum] (Germany)","institution_ids":["https://openalex.org/I4210096592"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078512511","display_name":"Itsaka Rakotonirina","orcid":"https://orcid.org/0000-0002-6587-971X"},"institutions":[{"id":"https://openalex.org/I4210096592","display_name":"Max Planck Institute for Security and Privacy","ror":"https://ror.org/00bj0r217","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210096592"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Itsaka Rakotonirina","raw_affiliation_strings":["MPI-SP, Bochum, Germany","MPI Security and Privacy - Max Planck Institute for Security and Privacy [Bochum] (Germany)"],"affiliations":[{"raw_affiliation_string":"MPI-SP, Bochum, Germany","institution_ids":["https://openalex.org/I4210096592"]},{"raw_affiliation_string":"MPI Security and Privacy - Max Planck Institute for Security and Privacy [Bochum] (Germany)","institution_ids":["https://openalex.org/I4210096592"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5075577852"],"corresponding_institution_ids":["https://openalex.org/I4210087817","https://openalex.org/I4210096592"],"apc_list":null,"apc_paid":null,"fwci":1.7319,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.85002767,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"263","last_page":"276"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.837522029876709},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8189246654510498},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.783466637134552},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7256079912185669},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6347098350524902},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5478852987289429},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4887866675853729},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.47766169905662537},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.43738389015197754},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.4240325391292572},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33749645948410034},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.24528339505195618}],"concepts":[{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.837522029876709},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8189246654510498},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.783466637134552},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7256079912185669},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6347098350524902},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5478852987289429},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4887866675853729},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47766169905662537},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.43738389015197754},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.4240325391292572},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33749645948410034},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.24528339505195618},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3548606.3559343","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3559343","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559343","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-03921822v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-03921822","pdf_url":"https://inria.hal.science/hal-03921822/document","source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"CCS 2022 - 2022 ACM SIGSAC Conference on Computer and Communications Security, Nov 2022, Los Angeles, CA, United States. pp.263-276, &#x27E8;10.1145/3548606.3559343&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:cris.unibo.it:11585/904240","is_oa":true,"landing_page_url":"https://hdl.handle.net/11585/904240","pdf_url":null,"source":{"id":"https://openalex.org/S4306402579","display_name":"Archivio istituzionale della ricerca (Alma Mater Studiorum Universit\u00e0 di Bologna)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210117483","host_organization_name":"Istituto di Ematologia di Bologna","host_organization_lineage":["https://openalex.org/I4210117483"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"doi:10.1145/3548606.3559343","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3559343","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559343","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4308361275.pdf","grobid_xml":"https://content.openalex.org/works/W4308361275.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W75368128","https://openalex.org/W1494222766","https://openalex.org/W1584543160","https://openalex.org/W1632088469","https://openalex.org/W1986886404","https://openalex.org/W1997423921","https://openalex.org/W2005880313","https://openalex.org/W2009426964","https://openalex.org/W2011329056","https://openalex.org/W2022738481","https://openalex.org/W2029693536","https://openalex.org/W2030988895","https://openalex.org/W2039275540","https://openalex.org/W2049696538","https://openalex.org/W2051588031","https://openalex.org/W2058329114","https://openalex.org/W2060349224","https://openalex.org/W2125609567","https://openalex.org/W2126897271","https://openalex.org/W2275140988","https://openalex.org/W2294814269","https://openalex.org/W2295804537","https://openalex.org/W2522035104","https://openalex.org/W2587679938","https://openalex.org/W2794691483","https://openalex.org/W2913157813","https://openalex.org/W2932671002","https://openalex.org/W2964335063","https://openalex.org/W2965215003","https://openalex.org/W2967051452","https://openalex.org/W3098700911","https://openalex.org/W3117640534","https://openalex.org/W4214833524","https://openalex.org/W4251392686","https://openalex.org/W4396509943"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W1488313539","https://openalex.org/W1971522943","https://openalex.org/W2956602083","https://openalex.org/W2141019415","https://openalex.org/W3013119816"],"abstract_inverted_index":{"Timed":[0],"cryptography":[1],"refers":[2],"to":[3,7,34],"cryptographic":[4,64,77],"primitives":[5,30,78],"designed":[6],"meet":[8],"their":[9,58],"security":[10],"goals":[11],"only":[12],"for":[13],"a":[14],"short":[15],"(polynomial)":[16],"amount":[17],"of":[18,48,68,70,89],"time.":[19,90],"Popular":[20],"examples":[21],"include":[22],"timed":[23,63],"commitments":[24],"and":[25,82],"verifiable":[26],"delay":[27],"functions.":[28],"Such":[29],"are":[31],"commonly":[32],"used":[33],"guarantee":[35],"fairness":[36],"in":[37,61],"multiparty":[38],"protocols":[39,65],"(\"either":[40],"none":[41],"or":[42],"all":[43],"parties":[44],"obtain":[45],"the":[46,49],"output":[47],"protocol'')":[50],"without":[51],"relying":[52],"on":[53],"any":[54],"trusted":[55],"party.":[56],"Despite":[57],"recent":[59],"surge":[60],"popularity,":[62],"remain":[66],"out":[67],"scope":[69],"current":[71],"symbolic":[72],"verification":[73],"tools,":[74],"which":[75],"idealise":[76],"as":[79],"algebraic":[80],"operations,":[81],"thus":[83],"do":[84],"not":[85],"consider":[86],"fine-grained":[87],"notions":[88]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
