PDMI TUM State University St. Petersburg
Steklov Institute St. Petersburg Technische Universität München State University St. Petersburg

Joint Advanced Student School (JASS)

Course 1: Algorithms in IT Security

St. Petersburg - Wednesday, March 30 through Saturday, April 9, 2005

Julian Traut

Two- and Multi-Party Protocols


After a short introduction we will present and discuss various protocols taken from [MOV96, GB01, Pfl96] and thereby introduce different approaches and techniques con- cerning cryptographic protocols. In the second part we will then outline a proof for the ability to construct secure protocols for any given functionality, as proposed in [Gol04].

Two- and Multi-Party Protocols[PDF]
Two- and Multi-Party Protocols[PDF]