期刊文献+

CS逻辑的分析及改进

The analysis and the modification of the CS logic
下载PDF
导出
摘要 较之以往的形式化分析工具BAN及BAN类逻辑,CS逻辑是一种将时间与逻辑结构相结合的逻辑,是第一个用来分析与时间相关的Timed--release公钥协议的逻辑,本文分析了原始CS逻辑的某些推理规则的缺陷,并对其作了改进及扩展,使其能够更好地反映Timed--release公钥协议的特性,并对一个具体的Timed-release公钥协议用扩展后的推理规则进行了有效的形式化分析. Compared with the existed analysis tools BAN and BAN-like, the CS Logic is a logic that combining time and logic structure. It is the first logic to be used to analyse Timed-release Cryptographic protocols that related to time. Some defects of the inference rules in former CS logic were analysed, modified and expanded to reflect the characters of Timed-release cryptographic protocols better. And finally, a specific Timed-release cryptographic protocol was analysed effectively by using these improved inference rules.
出处 《山东大学学报(工学版)》 CAS 2006年第5期102-106,共5页 Journal of Shandong University(Engineering Science)
基金 国家自然科学基金资助项目(60373039) 国家"863"基金资助项目(2003AA144151) 山东省自然科学基金资助项目(Y2003A03)
关键词 CS逻辑 Timed-release公钥协议 推理规则 CS Logic timed-release cryptographic protocol inference rules
  • 相关文献

参考文献4

  • 1RIVEST R L,SHAMIR A,WAGNER D A.Time-lock puzzles and timed-release cryptographic protocol[J].Mit Labortary for Computer Science,1996,55:545-554.
  • 2COFFEY T,SAIDHA P.Logic for verifying public-key cryptographic protocols[J].IEEE Proc Computers and Digital Techniques,1997,144(1):28-32.
  • 3BURROWS M,ABADI M,NEEDHAM R.A logic of authentication[R].New York:Digital Systems Research Center,1989.17-24.
  • 4范红,冯登国.一种分析Timed-Release公钥协议的扩展逻辑[J].计算机学报,2003,26(7):831-836. 被引量:5

二级参考文献6

  • 1Rivest R L, Shamir A, Wagner D A. Timed-lock puzzles and timed-release cryptographic protocol. MIT Laboratory for Computer Science. 1996.
  • 2Coffey T, Saidha P. Logic for verifying public-key cryptographic protocols. IEEE Proceedings of Computers and Digital Techniques, 1997, 144(1):28~32.
  • 3Syverson P, van Oorsehot P. On unifying some cryptographic protocol logics. In:Proceedings of IEEE Symposium on Security and Privacy, 1994. 14~28.
  • 4Fan Hong, Feng Deng-Guo. Carrent states of security protocal formal analysis. Net Security Technologies and Application,2001,1(8) : 12~15(in Chinese).
  • 5Feng Deng-Guo. Information security research and development. Net Security Technologies and Application, 2001,1(1) : 4~10(in Chinese).
  • 6Feng Deng-Guo, Pei Ding-Yi. The Guidance of Cryptograph.Beijing: Science Press,1999(in Chinese).

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部