Homework 2

CSCE 813 – Farkas

Spring 2014

 

Score: 10 points

 

Due: February 25, 2014 2:00 am

 

 

1.      Read the following papers:

a.        J. Y. Halpern and R. Pucella, Modeling Adversaries in a Logic for Security Protocol Analysis, Logical Methods in Computer Science, Vol. 8, 2012, http://arxiv.org/pdf/cs/0607146.pdf

b.      Garay et al., Rational Protocol Design: Cryptography Against Incentive-driven Adversaries, in Proc. of IEEE, 54th Foundations of Computer Science (FOCS) Symposium, October 2013, ftp://ftp.inf.ethz.ch/pub/crypto/publications/GKMTZ13.pdf

 

2.      Focus on understanding the main contribution of the paper (you may ignore the full technical details).  Answer the following questions for each article (about ½ page for each):

·         What are the main claims of the article?  

·         What supporting evidences/argument/etc. do the authors provide?

·         Do you agree with the authors’ claims?  Why/why not? 

·         Is the problem important?

 

3.      Analyze the main difference in the aim of the two articles.