期刊文献+

乐观公平交换协议的可追究性分析

Analysis to Accountability of Optimistic Fair Exchange Protocols
下载PDF
导出
摘要 可追究性是安全电子商务协议必须遵循的重要原则之一,乐观公平交换协议是一类重要的电子商务协议。目前没有针对乐观公平交换协议的可追究性进行形式化分析的具体方法。文章提出了一种分析乐观公平交换协议可追究性的形式化方法,该方法不再单独定义非否认证据,只是研究协议的目标设计是否能提供实现可追究性的证据,将可追究性证明与公平性等其它安全性质的证明分开讨论,这样不论协议是否满足其它安全性质,都可以讨论协议是否满足可追究性。 Accountability is one of main properties that security electronic commerce protocols must satlsfy.Optimlstlc fair exchange protocols are important electronic commerce protocols.There are no tools for the analysis of accountability of optimistic fair exchange protocols.A formal method that can analyze the accountability of optimistic fair exchange protocols is proposed in this paper.The method does not define nonrepudiation evidence.It only studies if the design of protocol goal can offer evidence of accountability. Thus accountability requirement can be discussed without reference to if the protocol satisfies fairness requirement.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第27期125-128,共4页 Computer Engineering and Applications
关键词 乐观公平交换协议 可追究性 形式化分析 optimistic fair exchange protocol,accountability,formal analysis
  • 相关文献

参考文献9

  • 1Jianying Zhou,Dieter Gollmann.Towards verification of non-repudiation protocols[C].In:International Refinement Workshop and Formal Methods Pacific,Canberra,Australia:Springer-Verlag,1998:370~380
  • 2Giampaolo Bella,Lawrence C Paulson.Mechanical proofs about a nonrepudiation protocol[C].In:Richard J Boulton,Paul B Jackson eds.Lecture Notes in Computer Science,Theorem Proving in Higher Order Logics,Springer-Verlag,2001 ;2152:91~104
  • 3Steve A Schneider.Formal analysis of a non-repudiation protocol[C].In:11th IEEE Computer Security Foundations Workshop,Washington-Brussels-Tokyo,1998:54~65
  • 4Vitaly Shmatikov,John Mitchell.Finite-state analysis of two contract signing protocols[J].Theoretical Computer Science,special issue on Theoretical Foundations of Security Analysis and Design,2002 ;283(2):419~450
  • 5Colin Boyd,Peter Kearney.Exploring fair exchange protocols using specification animation[C].In:Joseph Pieprzyk,Eiji Okamoto,Jennifer Seberry eds.Lecture Notes in Computer Science,Information Security International Workshop on Information Security,Wollogong,Australia:Springer-Verlag,2000; 1975
  • 6Steve KREMER.Formal Analysis of Optimistic Fair Exchange Protocols.Universit'e Libre de Bruxelles Facult'e des Sciences,2003-2004
  • 7卿斯汉.一种电子商务协议形式化分析方法[J].软件学报,2005,16(10):1757-1765. 被引量:23
  • 8N Asokan,Victor Shoup,Michael Waidner.Asynchronous protocols for optimistic fair exchange[C].In:Technical Committee on Security and Privacy,IEEE Symposium on Research in Security and Privacy,Oakland,CA:IEEE Computer Society Press,1998:86~99
  • 9卿斯汉.电子商务协议中的可信第三方角色[J].软件学报,2003,14(11):1936-1943. 被引量:31

二级参考文献24

  • 1卿斯汉,李改成.公平交换协议的一个形式化模型[J].中国科学(E辑),2005,35(2):161-172. 被引量:9
  • 2卿斯汉.安全协议的设计与逻辑分析.软件学报,2003,14(7):1300~1309.http://www.jos.org.cn/1000-9825/14/1300.htm.,.
  • 3卿斯汉.安全协议20年研究进展.软件学报, 2003,14(10):1740~1752.http://www.jos.org.cn/1000-9825/14/1740.htm.,.
  • 4ISO/IEC 3rd CD 13888-1. Information technology-Security techniques Part 1: General model. ISO/IEC JTC11/SC24 N1274, 1996.
  • 5Burrows M, Abadi M, Needham R. A logic of authentication. ACM Transactions on Computer Systems, 1990,8(1):18-36.
  • 6Kailar R. Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering, 1996,22(5):313-328.
  • 7Coffey T, Saidha P. Non-Repudiation with mandatory proof of receipt. Computer Communication Review, 1996,26(1):6- 17.
  • 8Deng RH, Gong L, Lazar AA, Wang W. Practical protocols for certified electronic mail. Journal of Network and Systems Management, 1996,4(3):279-297.
  • 9Asokan N, Shoup V, Waidner M. Asynchronous protocols for optimistic fair exchange. In: Proceedings of the 1998 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998. 86-99.
  • 10卿斯汉.安全协议20年研究进展.软件学报,2003,14(10):1740-1752[EB/OL].http://www.jos.org.cn/1000-9825/14/1740.htm.,.

共引文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部