Honest failure

Non-monotonic Security Protocols and Failures in Financial Intermediation

Security Protocols as we know them are monotonic: valid security evidence (e.g. commitments, signatures, etc.) accrues over protocol steps performed by honest parties. Once’s Alice proved she has an authentication token, got some digital cash, or casted a correct vote, the protocol can move on to validate Bob’s evidence. Alice’s evidence is never invalidated by honest Bob’s actions (as long as she stays honest and is not compromised). Protocol failures only stems from design failures or wrong assumptions (such as Alice’s own misbehavior).

© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma