The search functionality is under construction.

Author Search Result

[Author] Ken MANO(4hit)

1-4hit
  • Verifying Trace Equivalence of a Shared-Memory-Style Communication System

    Yoshinobu KAWABE  Ken MANO  

     
    PAPER

      Vol:
    E88-A No:4
      Page(s):
    915-922

    This paper describes a formal verification for a shared-memory-style communication system. We first describe two versions (i.e. abstract and concrete) of the communication system based on an I/O-automaton, which is a formal system for distributed algorithms. Then, we prove the concrete version can perform all the external operations of the abstract version. This result, together with a former result, leads to the equivalence of the two versions. The proof is done by Larch theorem prover, and is the ever largest case study using I/O-automata.

  • Quality and Quantity Pair as Trust Metric

    Ken MANO  Hideki SAKURADA  Yasuyuki TSUKADA  

     
    PAPER-Information Network

      Pubricized:
    2022/11/08
      Vol:
    E106-D No:2
      Page(s):
    181-194

    We present a mathematical formulation of a trust metric using a quality and quantity pair. Under a certain assumption, we regard trust as an additive value and define the soundness of a trust computation as not to exceed the total sum. Moreover, we point out the importance of not only soundness of each computed trust but also the stability of the trust computation procedure against changes in trust value assignment. In this setting, we define trust composition operators. We also propose a trust computation protocol and prove its soundness and stability using the operators.

  • On Backward-Style Anonymity Verification

    Yoshinobu KAWABE  Ken MANO  Hideki SAKURADA  Yasuyuki TSUKADA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:9
      Page(s):
    2597-2606

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  • FOREWORD Open Access

    Ken MANO  

     
    FOREWORD

      Vol:
    E103-D No:8
      Page(s):
    1782-1782