期刊文献+

不可否认协议时限性的形式化分析 被引量:13

Formal Analysis of Timeliness in Non-Repudiation Protocols
下载PDF
导出
摘要 虽然SVO逻辑由于其简单性在对不可否认协议的形式化分析中得到了广泛的应用,但它在时间描述能力上的不足使得它无法分析不可否认协议的时限性.通过向SVO逻辑添加一种简单的时间表达和分析方法扩展了SVO逻辑,并使用扩展后的逻辑对Zhou和Gollmann于1996年提出的一个公平不可否认协议及其一个改进协议进行了分析.分析结果表明,原协议不具有时限性,而改进协议具有时限性,因此也说明了扩展后的新逻辑能够分析不可否认协议的时限性.另外,新逻辑还能用来分析一般密码协议中的时间相关性质. While SVO logic has been widely used in the analysis of non-repudiation protocols for its simplicity, its lack of the ability in time description makes it helpless in the analysis of timeliness, which is one of the most important properties of non-repudiation protocols. SVO logic is extended by adding a simple time expression and analysis method into it. Then a widely discussed fair non-repudiation proposed by Zhou and Gollmann in 1996 and one of its improvements are analyzed with the newly extended logic. The result shows that Zhou-Gollmann's fair non-repudiation protocol does not provide timeliness while its improvement does. Therefore, the new logic is able to analyze timeliness of non-repudiation protocols. In addition, the new logic can be used to analyze other time-related properties of cryptographic protocols.
出处 《软件学报》 EI CSCD 北大核心 2006年第7期1510-1516,共7页 Journal of Software
基金 国家自然科学基金 江苏省高技术研究项目 江苏省网络与信息安全重点实验室~~
关键词 不可否认 时限性 SVO逻辑 形式化分析 non-repudiation timeliness SVO logic formal analysis
  • 相关文献

参考文献15

  • 1Norman G,Shmatikov V.Analysis ofprobabilistic contract signing.In:Proc.of the BCSFACS Formal Aspects of Security (FASec 2002).LNCS 2629,2002.81-96.http://citeseer.ist.psu.edu/norman02analysis.html 被引量:1
  • 2Buttyun L,Hubaux P,Capkun S.A formal model of rational exchange and its application to the analysis of Syverson's protocol.Journal on Computer Security,2004,12(3-4):551-587. 被引量:1
  • 3Abadi M,Blanchet B.Computer-Assisted verification of a protocol for certified email.In:Cousot R,ed.Static Analysis,the 10th Int'l Symp.(SAS 2003).LNCS 2694,2003.316-335. 被引量:1
  • 4Kremer S,Raskin JF.A game-based verification of non-repudiation and fair exchange protocols.Journal of Computer Security,2003,11(3):399-429. 被引量:1
  • 5Shmatikov V,Mitchell JC.Finite-State analysis of two contract signing protocols.Theoretical Computer Science,2002,283(2)419-450. 被引量:1
  • 6Syverson PF,van Oorschot PC.On unifying some cryptographic protocol logics.In:Proc.of the '94 IEEE Computer Society Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,1994.14-28. 被引量:1
  • 7Burrows M,Abadi M,Needham R.A logic of authentication.ACM Trans.on Computer Systems,1990,8(1):18-36. 被引量:1
  • 8Zhou J,Gollmann D.A fair non-repudiation protocol.In:Proc.of the 1996 IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,1996.55-61. 被引量:1
  • 9Kim K,Park S,Baek J.Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol.In:Gong K,Niu Z,eds.2000 IEEE Int'l Conf.on Communication.Beijing:IEEE Computer Society Press,2000,3:1743-1747. 被引量:1
  • 10Zhou J,Gollmann D.Towards verification of non-repudiation protocols.In:Proc.of the 1998 Int'l Refinement Workshop and Formal Methods Pacific.Berlin:Springer-Verlag,1998.370-380. 被引量:1

二级参考文献11

  • 1卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 2J Zhen, D Gollmann. A fair non-repudiation protocol. In IEEE Computer Society Symposium on Research in Security and Privacy, 1996. 被引量:1
  • 3M Abadi, A Gordon. A calculus for Cryptographic protocols: The spi calculus. Information and Computation, 1998. 被引量:1
  • 4Schneider S. Verifying Authentication Protocols with CSP, Proeedings of the IEEE Comoputer Security Foundations Workshop X, ( 1997)3 -17, IEEE Computer Society Press. 被引量:1
  • 5P F Syverson, P C van Oorschot. A Unified Cryptographic Protocol Logics. In Proceedings of the 1994 IEEE Computer Society Press,1994. 被引量:1
  • 6E F Brickell, D Chaum, I B Damgard, J van de Graaf. Gradual and verifible release of a secret, Lecmre-Notes in Computer Science 293,Advances in Cryptology: Proceedings of Crypto' 87, pages 156 - I66,Santa Barbara, CA Auguest, 1987. 被引量:1
  • 7Qing Sihan,Information and Communication Security—— CCICS’99:Proceedings on the 1st Chin,2000年,230页 被引量:1
  • 8卿斯汉,信息和通信安全CCICS’99:第1届中国信息和通信安全学术会议论文集,2000年,230页 被引量:1
  • 9Deng R H,J Network System Management,1996年,4卷,3期,279页 被引量:1
  • 10Zhou J,Proceedings of 1996IEEE Symposium on Security and Privacy,1996年,55页 被引量:1

共引文献36

同被引文献140

引证文献13

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部