期刊文献+

一种新的双方不可否认密码协议及其形式化分析

A New Mutually Undeniable Cryptographic Protocol and Its Formal Analysis
下载PDF
导出
摘要 不可否认服务是电子商务中重要数据和敏感信息通过网络传输的安全基础.不可否认协议正是专门为了提供不可否认服务而设计的网络协议.现有的密码协议很少有满足严格意义上的不可否认性的.我们对现有的一种双方不可否认密码协议进行了分析和改进.新的双方不可否认密码协议既克服了原协议的不足,能抵制中间人攻击,冒充攻击,重放攻击,又满足公平性,不可否认性等安全性要求;既避免了可信第三方的性能瓶颈问题,保证了传输信息的机密性和完整性,又达到了严格意义上的不可否认性.采用SVO逻辑进一步分析和证明了新协议的双方不可否认性质. Non-repudiation service is the foundation of security on which important data and sensitive news are conveyed on the Internet in ecommerce. Non-repudiation protocol is a special network protocol which provides non-repudiation service. But real non-repudiation protocol is relatively few. In this paper, a new mutually undeniable cryptographic protocol was proposed. The protocol not only prevents some possible types of attack (for example, Middle-in-Attack,Replay attack, Impersonation Attack et al. ), but also avoids the trusted third party being the bottleneck problem, and ensures the confidentiality and the integrity of transferring data, real non-repudiation of the sender and the receiver. The new protocol is of mutually undeniable property.
出处 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第5期635-640,共6页 Journal of Xiamen University:Natural Science
关键词 不可否认密码协议 可信第三方 SVO逻辑 形式化分析 undeniable cryptographic protocol trusted third party SVO logic formal analysis
  • 相关文献

参考文献8

  • 1Deng R H,Gong L. Practical protocols for certified electronic mail[J].Journal of Network and Systems Management,1996,4(3) :279--297.
  • 2Zhou J, Gollman d. A fair non-repudiation protocol[C]// Proceeding of 1996 IEEE Symposium on Security and Privacy. Oakland: IEEE Computer Society Press, 1996 : 55 -- 61.
  • 3Zhou J, Gollman d. An efficient non-repudiation protocol [R]. Proceedings of the 10th IEEE Computer Security Foundation Workshop, Rockport, Massa-chusetts, 1997:126--132.
  • 4Li X X, Huai J P. A new non-repudiation cryptographic protocol for both sender and receiver[J]. Journal of Beijing University of Aeronautics and Astronantics, 2002,27 (2) :182--185.
  • 5李艳平,张建中.一种双方不可否认密码协议[J].西安电子科技大学学报,2004,31(1):161-164. 被引量:3
  • 6李艳平.一种双方不可否认密码协议的分析与改进[J].淮海工学院学报(自然科学版),2006,15(2):18-21. 被引量:2
  • 7Syverson Paul F, van Oorschot Paul C. On unifying some cryptographie protocol logic[R]. Oakland,California, The 1994 IEEE Symp on Research in Security and Privacy, 1994.
  • 8Syverson P,Oorschot P van. A unified cryptographic protocol logic [R]. Center for High Assurance Computer Systems, Naval Research Laboratory, 1996,5540-227 : 1 -- 29.

二级参考文献6

  • 1EVEN S, GOLDREICH O, LEMPEL A. A randomizing protocol for signing contracts[J]. Communicationof the ACM,1985,28(6) :637-647.
  • 2ZHOU J, GOLLMAN D. A fair non-repudiation protocol [C]// ROSCHEISEN M, SERBAN C, eds.Proceeding of 1996 IEEE Symposium on Security and Privacy. Oakland: IEEE Computer Society Press,1996:55-61.
  • 3ZHOU J, GOLLMAN D. An efficient non-repudiation protocol [C]// Proceedings of the 10th IEEE Computer Security Foundation Workshop . Rockport, Massachusetts, 1997: 126-132.
  • 4LI X X, HUAI J P. A new non-repudiation cryptographic protocolrof both sender and receiver[J]. Journal of Beijing University of Aeronautics and Astronantics, 2002, 27(2) :182-185(Ch).
  • 5李先贤,怀进鹏.一种双方不可否认的密码协议及应用[J].北京航空航天大学学报,2001,27(2):182-185. 被引量:6
  • 6邓所云,胡正名,钮心忻,杨义先.一个公平的反拒认协议[J].通信学报,2002,23(2):51-57. 被引量:2

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部