期刊文献+

优化的匿名电子现金支付协议及其形式化验证

Optimization of anonymous e-cash payment protocol and its formal verification
下载PDF
导出
摘要 针对匿名电子现金支付协议存在的缺陷,提出了一种能够满足多种安全属性的优化协议。将会话密钥的协商与使用分为两个阶段进行,确保协议密钥保密性的实现;引入电子证书证明交易主体的身份,确保协议非否认性的实现;借助可信方传递付款收据,避免交易主体不诚实所导致的公平性缺失;引入FTP传输方式传送电子货币和付款收据,确保实现可追究性与公平性,进一步增强协议的鲁棒性。对优化协议进行形式化验证,结果表明,优化协议满足密钥保密性、非否认性、公平性、可追究性、原子性等安全属性。 In response on the existing problems of anonymous e-cash payment protocol,the paper proposed an optimal protocol,which could meet a variety of security properties. To ensure the realization of its key confidentiality,the agreement and use of the session key were divided into two stages. To realize its non-repudiation,the certificates were used to prove the identities of the transaction entities. To avoid unfairness arisen by the dishonest transaction entities,the transmission of payment receipt was achieved by the trusted party. The proposed protocol used FTP to transmit electronic cashes and payment receipts, which ensured achievement of accountability and fairness,and enhanced the robustness of the protocol. Formal verification results indicate that the optimal protocol satisfies key confidentiality,non-repudiation,accountability,fairness and atomicity.
作者 陈莉 刘军
出处 《计算机应用研究》 CSCD 北大核心 2010年第8期3053-3057,共5页 Application Research of Computers
基金 国家"863"计划资助项目(2007AA01Z471) 国家自然科学基金资助项目(60473021) 河南省重点科技攻关项目(072102210029) 河南省科技攻关项目(0624260017) 河南省教育厅自然科学研究计划项目(2010A520004)
关键词 安全属性 形式化验证 密钥保密性 非否认性 公平性 原子性 security property formal verification key confidentiality non-repudiation fairness atomicity
  • 相关文献

参考文献10

  • 1MEDVINSKY G,NEUMAN B C.Netcash:a design of practical electronic currency on the Internet[C] //Proc of the 1st ACM Conference on Computer and ComAnications Security.USA:ACM Press,1993:102-106. 被引量:1
  • 2DESPOINA P,PETROS D,KOSMAS P.A novel peer-to-peer payment protocol[J].International Journal of Network Security,2007,4(1):107-120. 被引量:1
  • 3HERNANDEZ-ARDIETA J,GONZALEZ-TABLASA A,ALVAREZA B R.An optimistic fair exchange protocol based on signature policies[J].Computers & Security,2008,27(7/8):309-322. 被引量:1
  • 4SHAO Jun,FENG Min,ZHU Bin,et al.An efficient certified email protocol[C] //Proc of 2007 Information Security Conference.2007:145-157. 被引量:1
  • 5王茜,杨德礼.一种基于SVO逻辑的新形式化验证方法[J].计算机集成制造系统-CIMS,2004,10(3):342-351. 被引量:6
  • 6周典萃,卿斯汉,周展飞.一种分析电子商务协议的新工具[J].软件学报,2001,12(9):1318-1328. 被引量:47
  • 7刘义春,张焕国.电子商务协议的串空间分析[J].计算机科学,2008,35(2):109-114. 被引量:6
  • 8陈莉..电子商务安全协议的设计与分析[D].解放军信息工程大学,2009:
  • 9CHEN Li,LI Xiang-dong.A novel micro-payment scheme for m-commerce based on self-renewal hash chains[C] //Proc of International Conference on Communications,Circuits and Systems Proc.Chengdu:UESTC Press,2007. 被引量:1
  • 10CHEN Li,JIANG Zhi-jun.Design and logical analysis of authenticated key exchange protocol[C] //Proc of the 4th IEEE International Conference on Wireless Communications,Networking and Mobile Computing.[S.l.] :IEEE Communications Society Press,2008. 被引量:1

二级参考文献35

  • 1[1]WANG Qian, YANG Deli. The study on atomic electronic cash protocol[A].Proceedings of International Symposium on Future Software Technology[C]. Wuhan: HUST Press,2002.26-29. 被引量:1
  • 2[2]CAMP J, HARKAVY M,TYGAR J D, YEE B. Anonymous atomic transactions[A]. Proceeding of the 2nd Usenix Workshop on Electronic Commerce[C].ACM Press,1996.123-133. 被引量:1
  • 3[3]CAMP J. An atomcity-generating protocol for anonymous currencies[J]. IEEE Transactions on Software Engineering, 2001,27(3):272-278. 被引量:1
  • 4[4]WANG Qian, YANG Deli. The research of dual-mode electronic cash system[A]. Proceedings of 2002 International Conference on Management Science&Engineering[C].Harbin:Harbin Institute of Technology Press,2002.1609-1613. 被引量:1
  • 5[5]BURROWS M, ABADI M, NEEDHAM R M. A logic of authentication[J]. ACM Transacion on Computer System,1990, 8 (1):18-36. 被引量:1
  • 6[6]BURMESTER M. On the risk of opening distributed keys[A]. In Advanced in Cryptology-CRYPTO'94[C]. Berlin: Springer-Verlag, LNCS (839),1994.308-317. 被引量:1
  • 7[7]NEUMAN B C, THEODORE,T S. An authentication service for compute network[J]. IEEE Communication Magazine,1990, 132(9):33-38. 被引量:1
  • 8[8]BOYD C, MAN W. On a limitation of BAN logic[A]. In Advances in Cryptology-Eurocrypt'93, Vol 765 of Lecture Notes in Computer Science[C]. Berlin:Springer-Verlag,1993.240-247. 被引量:1
  • 9[9]MAO W, BORD C. Towards the formal analysis of security protocol[A]. Proc of the Computer Security Foundations Wordshop VI[C].USA:IEEE Computer Society Press,1993.147-158. 被引量:1
  • 10[11]LI Gong, NEEDHAM R, YAHALOM R. Reasoning about belief in cryptographic protocol[A]. Proc of the 1990 IEEE Computer Society Symp on Research in Security &Privacy[C]. USA:IEEE Computer Society,1990.234-248. 被引量:1

共引文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部