期刊文献+

满足多种安全属性的复合型支付协议及其逻辑分析 被引量:5

Design and logical analysis of compound payment protocol satisfying a variety of security properties
下载PDF
导出
摘要 针对典型电子支付协议存在的安全目标单一,不能满足日益提高的安全需求等问题,提出了一种能够满足认证性、密钥新鲜性、密钥秘密性、非否认性、公平性、可追究性和原子性等多种安全属性的复合型安全支付协议,该协议的认证子协议基于令牌概念设计,能够实现高效认证及会话密钥协商。通过引入公钥证书证明协议主体的身份、借助可信方传递付款收据以及采用FTP方式传送电子货币和付款收据等方式提出了支付子协议。使用逻辑分析方法对该协议进行严格逻辑推理验证,结果表明该协议能够满足多种安全属性。 In view of the existing problems of the payment protocols,e.g.security goal is single,increasing security requires are not been satisfied.This paper proposed a compound payment protocol,which satisfies a variety of security properties,such as authenticity,freshness of key,secrecy of key,non-repudiation,accountability,fairness and atomicity.The authentication sub-protocol of the new protocol can authenticate identities of the important entities in the foremost time,and the session keys used for transaction are negotiated efficiently.The payment sub-protocol is designed by using the following improvements.The first improvement is introducing certificates to prove the identities of the protocol entities.The second is transmitting the payment receipts by the trusted party.The third is using FTP to transport electronic cashes and payment receipts.The new protocol is proven to satisfy a variety of security properties by the logical analysis.
作者 陈莉 袁开银
出处 《计算机应用研究》 CSCD 北大核心 2012年第7期2672-2677,共6页 Application Research of Computers
基金 国家"863"计划基金资助项目(2007AA01Z471) 国家自然科学基金资助项目(60473021) 河南省重点科技攻关项目(112102210015 072102210029) 河南省基础与前沿技术研究计划项目(122300410175)
关键词 复合型支付协议 密钥新鲜性 密钥秘密性 原子性 compound payment protocol freshness of key secrecy of key atomicity
  • 相关文献

参考文献9

二级参考文献36

  • 1[1]WANG Qian, YANG Deli. The study on atomic electronic cash protocol[A].Proceedings of International Symposium on Future Software Technology[C]. Wuhan: HUST Press,2002.26-29. 被引量:1
  • 2[2]CAMP J, HARKAVY M,TYGAR J D, YEE B. Anonymous atomic transactions[A]. Proceeding of the 2nd Usenix Workshop on Electronic Commerce[C].ACM Press,1996.123-133. 被引量:1
  • 3[3]CAMP J. An atomcity-generating protocol for anonymous currencies[J]. IEEE Transactions on Software Engineering, 2001,27(3):272-278. 被引量:1
  • 4[4]WANG Qian, YANG Deli. The research of dual-mode electronic cash system[A]. Proceedings of 2002 International Conference on Management Science&Engineering[C].Harbin:Harbin Institute of Technology Press,2002.1609-1613. 被引量:1
  • 5[5]BURROWS M, ABADI M, NEEDHAM R M. A logic of authentication[J]. ACM Transacion on Computer System,1990, 8 (1):18-36. 被引量:1
  • 6[6]BURMESTER M. On the risk of opening distributed keys[A]. In Advanced in Cryptology-CRYPTO'94[C]. Berlin: Springer-Verlag, LNCS (839),1994.308-317. 被引量:1
  • 7[7]NEUMAN B C, THEODORE,T S. An authentication service for compute network[J]. IEEE Communication Magazine,1990, 132(9):33-38. 被引量:1
  • 8[8]BOYD C, MAN W. On a limitation of BAN logic[A]. In Advances in Cryptology-Eurocrypt'93, Vol 765 of Lecture Notes in Computer Science[C]. Berlin:Springer-Verlag,1993.240-247. 被引量:1
  • 9[9]MAO W, BORD C. Towards the formal analysis of security protocol[A]. Proc of the Computer Security Foundations Wordshop VI[C].USA:IEEE Computer Society Press,1993.147-158. 被引量:1
  • 10[11]LI Gong, NEEDHAM R, YAHALOM R. Reasoning about belief in cryptographic protocol[A]. Proc of the 1990 IEEE Computer Society Symp on Research in Security &Privacy[C]. USA:IEEE Computer Society,1990.234-248. 被引量:1

共引文献64

同被引文献36

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部