期刊文献+

不可否认协议形式化分析的SVO逻辑方法 被引量:2

Formal analysis of non-repudiation protocols with SVO logic
下载PDF
导出
摘要 使用SVO逻辑对Zhou-Gollmann的公平不可否认协议的一个改进协议进行了形式化分析.在分析该协议的过程中,分析了使用SVO逻辑分析不可否认协议时存在的一些问题,这是分析过程无法发现Zhou-Gollmann不可否认协议的原因.这些问题包括协议目标的确定,协议时限性的描述与分析,协议初始假设集的确定等.分析协议时,不仅需要证明协议的最终目标,还需要证明中间目标.通过对SVO逻辑的语法进行扩展,使其具有显式的时间描述能力,从而能够分析不可否认协议的时限性. A new improvement of Zhou-Gollmann's fair non-repudiation protocol is analyzed with SVO logic. Some problems in the analysis of non-repudiation protocols using SVO logic, which are the causes why the flaw of Zhou-Gollmann's fair non-repudiation cannot be discovered, are discussed. These problems include determination of protocol goals, analysis of timeliness property of protocols and premise set establishment. In the analysis, both the final goals and the intermediary goals need to be proved. By extending the syntax of SVO logic, a time description method is added into it and, thus the timeliness of non-repudiation protocols can be analyzed.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2005年第5期688-691,共4页 Journal of Southeast University:Natural Science Edition
基金 江苏省"网络与信息安全"重点实验室计划资助项目(BM20033201) 江苏省高技术研究资助项目(BG2004036)
关键词 不可否认 公平性 SVO逻辑 形式化分析 non-repudiation fairness SVO logic formal analysis
  • 相关文献

参考文献9

  • 1Kremer S, Markowitch O, Zhou J. An intensive survey of non-repudiation protocols [J]. Computer Communications, 2002, 25(17): 1606-1621.
  • 2Zhou J, Gollmann D. A fair non-repudiation protocol [A]. In: Proceedings of 1996 IEEE Symposium on Security and Privacy [C]. Los Alamitos, CA, 1996. 55-61.
  • 3Zhou J, Gollmann D. Towards verification of non-repudiation protocols [A]. In: Proceedings of 1998 International Refinement Workshop and Formal Methods Pacific [C]. Canberra, Australia, 1998. 370-380.
  • 4Schneider S. Formal analysis of a non-repudiation protocol [A]. In: Proceedings of 11th IEEE Computer Security Foundations Workshop [C]. Rockport, Massachusetts, USA, 1998. 54-65.
  • 5Kim K, Park S, Baek J. Improving fairness and privacy of Zhou-Gollmanns fair non-repudiation protocol [A]. In: Proceedings of 2000 IEEE International Conference on Communication [C]. New Orleans, USA, 2000. 1743-1747.
  • 6Li Botao, Luo Junzhou. On timeliness of a fair non-repudiation protocol [A]. In: Proceedings of the 3rd International Conference on Information Security (InfoSecu04) [C]. Shanghai, 2004. 99-107.
  • 7Syverson P F, van Oorscho P C. On unifying some cryptographic protocol logics [A]. In: Proceedings of 1994 IEEE Computer Society Symposium on Security and Privacy [C]. Los Alamitos, CA, 1994. 14-28.
  • 8Syverson P F, van Oorschot P C. A unified cryptographic protocol logic [M]. TR: NRL Publication 5540-227, 1996.
  • 9Burrows M, Abadi M, Needham R. A logic of authentication [J]. ACM Transactions in Computer Systems, 1990, 8(1): 18-36.

同被引文献14

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部