期刊文献+

非否认协议公平性分析的扩展串空间方法 被引量:1

An Extended Strand Space Method for Fairness Analysis of Non-Repudiation Protocols
下载PDF
导出
摘要 针对在非否认协议公平性的形式化分析中,如何弱化初始假定和避免状态空间爆炸等问题,提出了扩展串空间方法.通过将签名运算引入串空间理论,从而对串空间理论的项集合进行重新定义,进一步通过对子项关系、攻击者迹和自由加密假定的扩展,并结合丛概念,构成了扩展串空间.分析非否认协议的公平性,首先将协议行为归纳为攻击者串、发送者串、接收者串和可信第3方串,以此构造协议的扩展串空间模型,然后结合协议迹和定理证明验证丛中存在发送者串等价于丛中存在接收者串,从而证明非否认协议公平性.通过扩展串空间方法对Zhou-Gollmann协议公平性的分析,得到了与Kailar逻辑和Lanotte自动验证方法相同的结果.与Kailar逻辑相比,扩展串空间方法仅使用自由加密假定,弱化了初始假定;与Lanotte自动验证方法相比,扩展串空间方法无需使用状态空间搜索,避免了状态空间爆炸问题. A new formal analysis method using extended strand space is presented to weaken initial assumptions and to avoid state space explosion in analyzing the fairness of non-repudiation protocols.Signature operations are introduced into the strand space theory,so that the set of terms and sub-term relations are redefined in the strand space theory.Then,an extended strand space model is constructed by inducing the action of protocols to the penetrating strand,the origin strand,the receiver strand,and the trusted third party strand.The fairness of non-repudiation protocols is analyzed by verifying that the existence of the origin strand in the bundle is equivalent to the existence of the receiver strand in the bundle depending on the measure of theorem proving.Analyzing results on Zhou-Gollmann protocol show that the proposed method can weaken initial assumptions compared with the logic method,and can avoid state space explosion compared with the state space method.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2010年第6期16-20,共5页 Journal of Xi'an Jiaotong University
基金 国家自然科学基金资助项目(60473027) 国家自然科学基金委员会-广东联合基金重点资助项目(U0835004)
关键词 非否认协议 扩展串空间 协议验证 公平性 non-repudiation protocol extended strand space protocol verification fairness
  • 相关文献

参考文献13

  • 1KREMER S,MARKOWITCH O,ZHOU J.An intensive survey of fair non-repudiation protocols[J].Computer Communications,2002,25 (17):1606-1621.
  • 2KAILAR R.Accountability in electronic commerce protocols[J].IEEE Transactions on Software Engineering,1996,22(5):313-328.
  • 3周典萃,卿斯汉,周展飞.一种分析电子商务协议的新工具[J].软件学报,2001,12(9):1318-1328. 被引量:47
  • 4黎波涛,罗军舟.不可否认协议时限性的形式化分析[J].软件学报,2006,17(7):1510-1516. 被引量:13
  • 5韩志耕,罗军舟.多方不可否认协议时限性分析与改进[J].电子学报,2009,37(2):377-381. 被引量:10
  • 6LANOTTE R,MAGGIOLO-SCHETTINI A,TROINA A.Automatic analysis of a non-repudiation protocol[J].Electronic Notes in Theoretical Computer Science,2005,112(S):113-129.
  • 7GUO Yingjun,LIN Chuang,YIN Hao.Formal proof of the IDOP_SP protocol based on the Petri net[C] //Proceedings of the 2008 IEEE International Conference on NAS.Piscataway,NJ,USA:IEEE,2008:161-162.
  • 8FABREGA F J T,HERZOG J C,GUTTMAN J D.Strand spaces:why is a security protocol correct?[C] //Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy.Los Alamitos,CA,USA.IEEE Computer Society,1998.160-171.
  • 9FABREGA F J T,HERZOG J C,GUTTMAN J D.Honest ideals on strand spaces[C] // Proceedings of the Computer Security Foundations Workshop.Los Alamitos,CA,USA:IEEE Computer Society,1998:66-77.
  • 10FABREGA F J T,HERZOG J C,GUTTMAN J D.Mixed strand spaces[C] //Proceedings of the Computer Security Foundations Workshop.Los Alamitos,CA,USA:IEEE Compute Society,1999:72-82.

二级参考文献32

  • 1范红,冯登国.一个非否认协议ZG的形式化分析[J].电子学报,2005,33(1):171-173. 被引量:8
  • 2黎波涛,罗军舟.不可否认协议时限性的形式化分析[J].软件学报,2006,17(7):1510-1516. 被引量:13
  • 3ISO/IEC DIS 10181-4, Information Technology-Open Systems Interconnection-Security Frameworks in Open Systems, Part 4: Non-repudiation, ISO/IEC JTC1[S ].
  • 4Kremer S,Markowitch O, Zhou J. An intensive survey of non- repudiation protocols [J].Computer Communications, 2002,25 (17) : 1606 - 1621.
  • 5Zhou J, GoUmann D. A fair non-repudiation protocol[A]. Proc of the 1996 1EEE Symp. on Security and Privacy[C]. Oakland, CA: IEEE Computer Society Press, 1996.55 - 61.
  • 6Pancho-Festin S, Gollmann D. On the formal analyses of the Zhou-Gollmann non-repudiation protocol[ A]. Dimitrakos T, et al. FAST' 05 [ C ]. Berlin Heidelberg: LNCS 3866, Springer Verlag, 2006.5 - 15.
  • 7Louridas P. Some guidelines for non-repudiation protocols[J].ACM SIGCOMM Computer Communication Review, 2000, 30 (1) :29 - 38.
  • 8Kim K, Park S, Baek J. Improving fairness and privacy of Zhou-Gollmann' s fair non-repudiation protocol [ A ]. Proc of the 1999 ICPP workshop on Security ( IWSEC ) [ C ]. Aizu, Japan: IEEE Computer Society, 1999.140 - 145.
  • 9Li Botao,Luo Junzhou. On timeliness of a fair non-repudiation protocol[ A]. Proceedings of the 3rd intemalional conference on Information security ( InfoSecu' 04) [ C ]. Shanghai, 2004.99 - 107.
  • 10Zhou J, GoUmann D. Towards verification of non-repudiation protocols [A]. In: Proc. of the 1998 Int' 1 Refinement Workshop and Formal Methods Pacific [ C ]. Berlin: Springer-Verlag, 1998.370 - 380.

共引文献63

同被引文献11

  • 1沈海峰,薛锐,黄河燕,陈肇雄.串空间理论扩展[J].软件学报,2005,16(10):1784-1789. 被引量:16
  • 2Wrona K, Schuba M, Zavagli G. Mobile payments-state of the art and open problems [ J ]. Electronic Commerce Lecture Notes in Computer Science,2001,2232:88- 100.
  • 3Tripathi D M. A note on modified SET protocol for mobile payment [ C]//Internet Technology and Secured Transac- tions 2011. New York : IEEE Computer Society Press, 2011 : 639 - 641.
  • 4Shedid S M, E1Hennawy M, Kouta M. Modified SET protocol for mobile payment : An empirical analysis [ J ]. International Journal of Computer Science and Network Security,2010,10 (7) :289 -295.
  • 5Liang Jin. Research on WAP clients supports SET payment protocol[ J ]. Wireless Communications, 2001,9 ( 1 ) : 90 - 95.
  • 6You Ziyi, Xie Xiaoyao, Xu Yang. Formal analysis of mobile payment protocol KSL based on SSM [ C ]//Proceedings of the 2010 International Forum on Information Technology and Applications. New York: IEEE Computer Society Press, 2010:333 - 336.
  • 7Guttman J D, FMrega F J T. Authentication tests and the structure of bundles [ J ]. Theoretical Computer Science,2002, 283(2) :333 -380.
  • 8Deng Zhenrong, Huang Wenming, Dong Rongsheng, et al. In- terest property of e-commerce protocols and its verification in strand space model[ C ]//Proceeding of the 3rd International "Conference on Genetic and Evolutionary Computing. New York : IEEE Computer Society Press, 2009 : 280 - 283.
  • 9Thayer F J, Herzog J C, Guttman J D. Strand spaces:Why is a security protocol correct [ C ]//Proceedings of 1995 IEEE Symposium on Security and Privacy. New York:IEEE Computer Society Press, 1998 : 160 - 171.
  • 10FLbrega F J T, Herzog J C, Guttman J D. Honest ideals on strand spaces[ C ]//Proceeding of the llth IEEE Computer Security Foundations Workshop. New York:IEEE Computer Society Press, 1998 : 66 - 77.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部