You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Dave Parker 7b1d8c5e74 Tweaked some auto files. 17 years ago
..
.autopp Tidied up dining cryptographers example. 18 years ago
.dining_cryptN.nm.pp Tidied up dining cryptographers example. 18 years ago
README Dining cryptographers example. 18 years ago
anonymity.pctl Tidied up dining cryptographers example. 18 years ago
auto Changed auto (commented out parts so run more quickly for testing. 18 years ago
correctness.pctl Tidied up dining cryptographers example. 18 years ago
dining_crypt3.nm Tidied up dining cryptographers example. 18 years ago
dining_crypt4.nm Tidied up dining cryptographers example. 18 years ago
dining_crypt5.nm Tidied up dining cryptographers example. 18 years ago
dining_crypt6.nm Tidied up dining cryptographers example. 18 years ago
dining_crypt7.nm Tidied up dining cryptographers example. 18 years ago
dining_crypt8.nm Tidied up dining cryptographers example. 18 years ago
dining_crypt9.nm Tidied up dining cryptographers example. 18 years ago
dining_crypt10.nm Tidied up dining cryptographers example. 18 years ago
dining_crypt15.nm Tidied up dining cryptographers example. 18 years ago

README

This case study is based on the well known dining cryptographers problem [Cha88].


For more information, see: http://www.prismmodelchecker.org/casestudies/dining_crypt.php

=====================================================================================

[Cha88]
D. Chaum
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
Journal of Cryptology, vol. 1, pp 65-75, 1988