期刊文献+

非否认协议中认证保密性的设计与形式化分析

Design and Formal Analysis of Secrecy in the Non-repudiation Protocol
下载PDF
导出
摘要 探讨了非否认协议的保密性认证目标,用攻击的方法验证了A(0)协议在认证保密性方面的不足;对其消息格式和会话密钥建立后确认方式做了修改,提出了NA(0)协议;进一步运用SVO逻辑对NA(0)协议进行了形式化的分析,验证了NA(0)协议满足主体身份的认证性和会话密钥的保密性。 On the basis of discussing the secrecy goals of non-repudiation protocol, the papar validateed the shortages of A(0) protocol by the means of aggressing, revamped the affirmanee fashion of its information format and conversation encrypting keys, and lodged NA(0)protocol. Then the NA(0)protocol was analysed formally by SVO logic, and it was validated fulfilling the authentication of main identity and secrecy of conversation.
作者 张虹
出处 《计算机科学》 CSCD 北大核心 2008年第10期140-142,共3页 Computer Science
基金 山东省科技攻关项目(2007GG30003003)
关键词 非否认协议 认证保密性 形式化分析 SVO逻辑 Non-repudiation protocol, Secrecy,Formal analysis,SVO Logic
  • 相关文献

参考文献6

二级参考文献17

  • 1范红,冯登国.一个非否认协议ZG的形式化分析[J].电子学报,2005,33(1):171-173. 被引量:8
  • 2卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 3Jim Davies, Jim Woodcock. Using Z: Specification, Refinement and Proof. Prentice Hall International Series in Computer Science, 1996.
  • 4Asokan. Fairness in Electronic Commerce. PhD thesis, University of Waterloo, May 1998.
  • 5Steve KREMER Formal Analysis of Optimistic Fair Exchange Protocols. PhD thesis, Universit'e Libre de Bruxelles Facult'e des Sciences, 2003-2004.
  • 6Rohit Chadha, Max Kanovich, Andre Scedrov. Inductive methods and contract signing protocols. In:Pierangela Samarati, ed. 8th ACM Conference on Computer and Communications Security, Philadelphia,PA: ACM Press, November 2001, 176-185.
  • 7Steve A. Schneider. Formal analysis of a non-repudiation protocol. In: 11th IEEE Computer Security Foundations Workshop, Washington-Brussels-Tokyo, IEEE June, 1998. 54-65.
  • 8Giampaolo Bella, Lawrence C. Paulson. Mechanical proofs about a nonrepudiation protocol. In: Richard J.Boulton, Paul B. Jackson, ed. Theorem Proving in Higher Order Logics, volume 2152 of Lecture Notes in Computer Science, Springer-Verlag, 2001, 91-104.
  • 9Colin Boyd ,Peter Kearney. Exploring fair exchange protocols using speci.cationanimation. In: Joseph Pieprzyk, Eiji Okamoto, Jennifer Seberry, ed. Information Security-International Workshop on Information Security, volume 1975 of Lecture Notes in Computer Science,Wollogong, Australia, Springer-Verlag.December 2000.
  • 10KHAN A S,MUKUND M,SURESH S P.Generic verification of security protocols[C]//12th International SPIN Workshop on Model Checking of Software.Berlin:Springer,2005,3639:221-235.

共引文献126

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部