期刊文献+

基于Petri网的数字媒体分发协议的安全性证明 被引量:4

Proof of the Security of Digital Media Distributing Protocol Based on Petri Net Models
下载PDF
导出
摘要 安全协议的形式化证明是目前的一个热点和难点问题.本文以一种数字媒体分发协议(DMDP)为例,采用基于Petri网模型并结合进程代数和逻辑归纳方法对其进行形式化证明,新的方法有效避免了状态空间爆炸问题.在证明过程中,采用协议安全性等价原则,对分发协议进行简化,使证明更加简洁.文章同时对证明方法的完备性进行了讨论,说明了Petri网模型证明协议安全性的有效性. The formal proof of the security protocol becomes a hot and hard issue. Taking the Digital Media Distribufion Protocol as an example, the Petri Net model is adopted which combined with the process algebra and the logical induction methods to formally prove the present security protocol and can avoid the state explosion problem. In this proof an equality principle is used to Iransform the security protocols to guarantee the simplicity of the proof. At the same lime, the completeness of the proof is discussed and what we have done shows the validity of proving the security of protocol with a Petri Net model.
出处 《电子学报》 EI CAS CSCD 北大核心 2009年第5期1030-1036,共7页 Acta Electronica Sinica
基金 国家自然科学基金(No.60673184,No.60673187,No.60673054,No.90412012) 973计划前期研究专项(No.2006CB708301) 中国移动通信研究院项目 教育部科技创新培育重点项目(No.707005)
关键词 PETRI网 安全协议 数字媒体 Petri net security protocol digital media
  • 相关文献

参考文献9

  • 1MillenJ,Rueb H.Protocol-independent secrecy[A].Proceedings of the 2000 IEEE Symposium on Security and Privacy[C].Berkeley,California,2000.110-120.
  • 2Canetti R.A unified f ramework for analyzing security of protocols(preliminary version)[R].Electronic Colloquium on Computational Complexity,ECCC Report TR012016,2001,8(16).
  • 3Yingjiu Guo,Chuang Lin,Hao Yin.Design and analysis of IPTV digital copyright management security protocol[A].Intelligent Signal Processing and Communication Systems[C].Xiamen,China,2007.554-557.
  • 4林闯,雷蕾.下一代互联网体系结构研究[J].计算机学报,2007,30(5):693-711. 被引量:64
  • 5范科峰,莫玮,曹山,赵新华,裴庆祺.数字版权管理技术及应用研究进展[J].电子学报,2007,35(6):1139-1147. 被引量:62
  • 6Federico Oazzolara,Glynn Winskel.Petri nets in cryptographic protocols[A].Parallel and Distributed Processing Symposium,Proceedings 15th International[C].San Francisco,CA,IEEE Computr Society Apr 2001 page(s):1507-1515.
  • 7Mei Lin Hui,Gavin Lowe.Safe simplifying transformations for security protocols or not just the needham schroeder public key protocol[A].12th IEEE Computer Security Fondations Workshop[C].Mordano,Italy:IEEE Computer Society Press,June 28-30,1999.32-43.
  • 8Dolev D,Yao A.On the security of public key protocols[J].IEEE Transactions on Information Theory,1983,29(2):198-208.
  • 9王剑,唐朝京,张权,张森强.基于Petri网的密码协议分析[J].计算机工程与科学,2006,28(2):24-27. 被引量:2

二级参考文献14

共引文献124

同被引文献39

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部