Homework 2
CSCE 813 – Farkas
Spring 2014
Score: 10 points
Due: February 25, 2014 2:00 am
1. Read the following papers:
a. J. Y. Halpern and R. Pucella, Modeling Adversaries in a Logic for Security Protocol Analysis, Logical Methods in Computer Science, Vol. 8, 2012, http://arxiv.org/pdf/cs/0607146.pdf
b. Garay et al., Rational Protocol Design: Cryptography Against Incentive-driven Adversaries, in Proc. of IEEE, 54th Foundations of Computer Science (FOCS) Symposium, October 2013, ftp://ftp.inf.ethz.ch/pub/crypto/publications/GKMTZ13.pdf
2. Focus on understanding the main contribution of the paper (you may ignore the full technical details). Answer the following questions for each article (about ½ page for each):
· What are the main claims of the
article?
· What supporting
evidences/argument/etc. do the authors provide?
· Do you agree with the authors’
claims? Why/why not?
· Is the problem important?
3. Analyze the main difference in the aim of the two articles.