期刊文献+

安全协议匿名性形式化分析 被引量:1

Formally Analyzing the Anonymity of Security Protocols
下载PDF
导出
摘要 改进了一般安全协议模型GSPM,提出了一个新的框架GSPM#,以弥补GSPM框架没有研究安全协议匿名性的不足.同时,用不同的方法定义了新框架下的匿名性,包括事件匿名性和数据匿名性.最后,以DCP(Dining Cryptographers Protocol)和它的变体为例,进行了匿名性分析的实例研究. A new framework—— GSPM^# was introduced, by improving the generic model for analyzing security protocols—— GSPM, which analyzes the anonymity property of security protocols in order to make up the drawbacks of GSPM. Event anonymity and data anonymity were defined in the framework GSPM^# with respect to different approaches. Finally, dining cryptographers protocol (DCP) and one of its variants were analyzed in this framework.
作者 宋琳 蔡小娟
出处 《上海交通大学学报》 EI CAS CSCD 北大核心 2008年第4期523-528,共6页 Journal of Shanghai Jiaotong University
基金 国家杰出青年科学基金资助项目(60225012) 国家重点基础研究发展规划(973)项目(2003CB317005) 国家自然科学基金资助项目(60473006) 浙江省科技计划项目(2007C31009)
关键词 安全协议 匿名性 GSPM security protocol anonymity generic model for the analysis of the security protocols(GSPM)
  • 相关文献

参考文献11

  • 1卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752. 被引量:118
  • 2Halpern J Y. Anonymity and information hiding in multiagent systems[J]. Journal of Computer Security, 2005, 13(3): 75-88.
  • 3Syverson P, Stubblebine S. Group principals and the formalization of anonymity[C]// World Congress on Formal Methods in the Development of Computing Systems. France: Springer, 1999: 814-833.
  • 4Hughes D, Shmatikov V. Information hiding, anonymity and privacy.. A modular approach[J]. Journal of Computer Security, 2004, 12(1): 3-36.
  • 5Schneider S. Sidiropoulos A. CSP and anonymity [C]// In Proc 4th European Symposium on Research in Computer Security. Italy: Springer, 1996 : 198-218.
  • 6Mauw S, Verschuren J, de Vink E P. A formalization of anonymity and onion routing[C]//In Proc 9th European Symposium on Research Computer Security. France: Springer, 2004 : 109-124.
  • 7Mauw S, Verschuren J, de Vink E P. Data anonymity in the FOO voting scheme[J]. Electronic Notes in Theoretical Computer Science, 2007, 168: 5-28.
  • 8GU Yong-gen, FU Yu-xi, ZHONG Fa-rong, et al. A generic model for analyzing security protocols[C]//In Proc 3th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. Russia: Springer, 2005: 119-128.
  • 9顾永跟,傅育熙,朱涵.基于可达关系的安全协议保密性分析[J].计算机学报,2007,30(2):255-261. 被引量:4
  • 10Dolev D, Yao A. On the security of public key protocols[J]. IEEE Trans on Information Theory, 1983, 29 (2): 198-208.

二级参考文献18

  • 1李梦君,李舟军,陈火旺.基于进程代数安全协议验证的研究综述[J].计算机研究与发展,2004,41(7):1097-1103. 被引量:25
  • 2卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 3薛锐.安全协议的形式化分析技术和方法.安全协议研讨会,北京,2004.
  • 4Meadows C.Formal methods for cryptographic protocol analysis:Emerging issues and trends.IEEE Journal on Selected Areas in Communications,2003,21(1):44-54
  • 5Ryan P Y A,Schneider S A,Goldsmith M H,Lowe G,Roscoe A W.The Modeling and Analysis of Security Protocols:The CSP Approach.Londdon,England:Pearson,2001
  • 6Abadi M,Gordon A D.A calculus for cryptographic protocols:The spi calculus//Proceedings of the 4th ACM Conference on Computer and Communications Security.Zurich,Switzerland,1997:36-47
  • 7Boreale M,Buscemi M G.A framework for the analysis of security protocols//Proceedings of the 13th International Conference on Concurrency Theory,Lecture Notes in Computer Science 2421.London,UK:Springer-Verlag,2002:483-498
  • 8Abadi M.Security protocols and specifications//Proceedings of the 2nd International Conference on Foundations & of Software Science and Computation Structure,Lecture Notes in Computer Science 1578.London,UK:Springer-Verlag,1999:1-13
  • 9Dolev D,Yao A.On the security of public key protocols.IEEE Transactions on Information Theory,1983,29(2):198-208
  • 10Clarke M,Grumberg O,Peled D.Model Checking.USA:Mit Press,2000

共引文献120

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部