期刊文献+

一种分析安全协议的新逻辑 被引量:2

New Logic for Analyzing Security Protocols
下载PDF
导出
摘要 提出了一种分析安全协议的新逻辑,既能有效地分析认证协议的认证性,又能分析电子商务协议的可追究性和公平性。该方法对认证协议的分析,不需要协议理想化,避免了因理想化而导致的各类问题。能够有效地分析电子商务协议的可追究性和公平性,用于分析实用协议。分析过程简单直观,便于实现机器自动验证。 This paper presents a new logic which can be used to analyze security protocols. There is no necessity to idealize protocols when analyzing authentication protocols, which can avoid analysis errors caused by informal idealization. The new logic can be used to analyze accountability and fairness in electronic commerce protocols including the real-world protocols. The process of analyzing protocols is concise and can be implemented automatically.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第23期163-166,共4页 Computer Engineering
关键词 安全协议 逻辑 可追究性 公平性 自动验证 security protocols logic accountability fairness automatic verification
  • 相关文献

参考文献8

  • 1Burrows M, Abadi M, Needham R. A Logic of Authentication[Z]. Digital Systems Research Center, Pao Alto, California, 1989.
  • 2Syverson P, Oorschot P. On Unifying Some Cryptographic Protocol Logics[C].Proc. of the IEEE Computer Society Symp. on Security and Privacy. 1994: 346-347.
  • 3Kailar R. Accountability in Electronic Commerce Protocols[J]. IEEE Transactions on Software Engineering,. 1996, 2(5): 313-328.
  • 4Kessler V, Neumann H. A Sound Logic for Analyzing Electronic, Commerce Protocols[C].Proceedings of ESORICS'98. 1998.
  • 5Kungpisdan S, Permpoontanalarp Y. Practical Reasoning About Accountability in Electronic Commerce Protocols[C].Proceedings of the 4th International Conference on Information Security and Cryptology, Seoul, Korea. 2001 - 12-06.
  • 6周典萃,卿斯汉,周展飞.一种分析电子商务协议的新工具[J].软件学报,2001,12(9):1318-1328. 被引量:47
  • 7Needham R, Schroeder M. Using Encryption for Authentication in Large Networks of Computers[J]. Communications of the ACM, 1978, 21(12): 993-999.
  • 8Bellare M, Garay J A, Hauser R, et al. Design, Implementation and Deployment of the iKP Secure Electronic Payment System[J]. IEEE Journal of Selected Areas in Communications, 2000, 18(4): 611-627.

二级参考文献1

共引文献46

同被引文献20

  • 1董荣胜,陈大伟,郭云川,古天龙.公平非否认协议的有限状态分析[J].计算机科学,2005,32(8):83-86. 被引量:6
  • 2卿斯汉.一种电子商务协议形式化分析方法[J].软件学报,2005,16(10):1757-1765. 被引量:23
  • 3沈海峰,薛锐,黄河燕.用串空间分析公平交换协议[J].小型微型计算机系统,2006,27(1):62-68. 被引量:4
  • 4黎波涛,罗军舟.不可否认协议时限性的形式化分析[J].软件学报,2006,17(7):1510-1516. 被引量:13
  • 5Pagnia H, Vogt H, Gartner F. Fair Exchange[J]. The Computer Journal, 2003, 8(2): 55-75.
  • 6Kremer S, Markowitch O. An Intensive Survey of Fair Nonrepudiation Protocols[J]. Computer Communications, 2002, 25(17): 1601-1621.
  • 7Asokan N, Schunter M, Waidner M. Optimistic Protocols for Fair Exchange[C]//Proc. of the 4th ACM Conference on Computer and Communications Security. Zurich, Switzerland: ACM Press, 1997: 8-17.
  • 8Kremer S, Raskin J. Game Analysis of Abuse-free Contract Signing[C]//Proc. of the 15th IEEE Computer Security Foundations Workshop. Washington D. C., USA: IEEE Computer Society Press, 2002: 206-220.
  • 9Kremer S, Raskin J. A Game-based Verification of Non-repudiation and Fair Exchange Protocols[J]. Journal of Computer Security, 2003, 11(3): 399-429.
  • 10Kremer S. Formal Analysis of Optimistic Fair Exchange Protocols[D]. Brussels, Belgium: Universit'e Libre de Bruxelles Facult'e des Sciences, 2004.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部