Towards a Game-Theoretic Security Analysis of Off-Chain Protocols.
Sophie RainGeorgia AvarikiotiLaura KovácsMatteo MaffeiPublished in: CSF (2023)
Keyphrases
- game theoretic
- security analysis
- authentication protocol
- key exchange
- security properties
- mutual authentication
- game theory
- secure electronic
- decision problems
- security requirements
- public key
- smart card
- high security
- encryption scheme
- nash equilibrium
- trust model
- user authentication
- authentication scheme
- agent programming
- key distribution
- cryptographic protocols
- nash equilibria
- pure nash equilibrium
- minority game
- security protocols
- wireless sensor networks
- information security
- utility function