期刊文献+

A Formal Model for Analyzing Fair Exchange Protocols Based on Event Logic

下载PDF
导出
摘要 Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and electronic contract signing,ensuring the reliability and security of network transactions.In order to address the limitations of current research methods and enhance the analytical capabilities for fair exchange protocols,this paper proposes a formal model for analyzing such protocols.The proposed model begins with a thorough analysis of fair exchange protocols,followed by the formal definition of fairness.This definition accurately captures the inherent requirements of fair exchange protocols.Building upon event logic,the model incorporates the time factor into predicates and introduces knowledge set axioms.This enhancement empowers the improved logic to effectively describe the state and knowledge of protocol participants at different time points,facilitating reasoning about their acquired knowledge.To maximize the intruder’s capabilities,channel errors are translated into the behaviors of the intruder.The participants are further categorized into honest participants and malicious participants,enabling a comprehensive evaluation of the intruder’s potential impact.By employing a typical fair exchange protocol as an illustrative example,this paper demonstrates the detailed steps of utilizing the proposed model for protocol analysis.The entire process of protocol execution under attack scenarios is presented,shedding light on the underlying reasons for the attacks and proposing corresponding countermeasures.The developedmodel enhances the ability to reason about and evaluate the security properties of fair exchange protocols,thereby contributing to the advancement of secure network transactions.
出处 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2641-2663,共23页 工程与科学中的计算机建模(英文)
基金 the National Natural Science Foundation of China(Nos.61562026,61962020) Academic and Technical Leaders of Major Disciplines in Jiangxi Province(No.20172BCB22015) Special Fund Project for Postgraduate Innovation in Jiangxi Province(No.YC2020-B1141) Jiangxi Provincial Natural Science Foundation(No.20224ACB202006).
  • 相关文献

参考文献13

二级参考文献50

  • 1鲁来凤,段新东,马建峰.Otway-Rees协议改进及形式化证明[J].通信学报,2012,33(S1):250-254. 被引量:3
  • 2季庆光,冯登国.对几类重要网络安全协议形式模型的分析[J].计算机学报,2005,28(7):1071-1083. 被引量:23
  • 3QING Sihan1,2,3 & LI Gaicheng1,2,3 1. Engineering Research Center for Information Security Technology, Institute of Software, Chinese Aca- demy of Sciences, Beijing 100080, China,2. Beijing Zhongke Ansheng Corporation of Information Technology, Beijing 100080, China,3. Graduate School of the Chinese Academy of Sciences, Beijing 100039, China.A formal model of fair exchange protocols[J].Science in China(Series F),2005,48(4):499-512. 被引量:9
  • 4卿斯汉.一种电子商务协议形式化分析方法[J].软件学报,2005,16(10):1757-1765. 被引量:23
  • 5王芷玲,张玉清,杨波.一个公平电子合同签署协议的设计[J].计算机工程,2006,32(19):159-161. 被引量:4
  • 6Alur R,Henzinger T A,Kupferman O.Alternating-time temporal logic[J].Journal of the ACM(JACM),2002,49(5):672-713.
  • 7El-Menshawy M,Bentahar J,Dssouli R.Symbolic model checking commitment protocols using reduction[M]//Declarative Agent Languages and Technologies VIII.Berlin Heidelberg:Springer,2011:185-203.
  • 8Bauland M,Mundhenk M,Schneider T,et al.The tractability of model-checking for LTL:The good,the bad,and the ugly fragments[J].Electronic Notes in Theoretical Computer Science,2009,231:277-292.
  • 9Alrabaee S,Bataineh A,Khasawneh F A,et al.Using model checking for trivial file transfer protocol validation[C]//Proceedings of International Conference on Communications and Networking(Com Net),2014:1-7.
  • 10Armando A,Carbone R,Compagna L.LTL model checking for security protocols[J].Journal of Applied Non-Classical Logics,2009,19(4):403-429.

共引文献117

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部