ABSTRACT

This work analyzes several two-party cryptographic protocols from a rational point of view using a game-theoretical approach, which is used to represent not only the protocols but also possible misbehaviours of parties. With these tools, protocols are studied in a malicious model in order to find equilibrium conditions that allow to protect honest parties against all possible strategies of adversaries.