期刊文献+

一种适于带时间戳安全协议的形式化分析方法 被引量:1

Formal analysis method suitable to security protocols with timestamp
下载PDF
导出
摘要 提出了一种适用于带有时间戳的安全协议的有色Petr(iCPN)形式化分析方法,利用一个非自动时钟来描述协议中涉及的时间因素。对著名的WMF协议建模,利用CPN Tools,采用CPNML语言编写查询函数验证协议的新鲜性,从而发现协议的漏洞。应用分析结果表明该方法有效,且操作简单容易理解。 This paper proposes a formal analysis method suitable to security protocols with timestamp. This method uses a non-auto clock to describe time factors involved in security protocols. Based on this method, it models for the famous WMF protocol. Under the CPN Tools, it programs query functions for verifying the freshness character in CPN so that flaws of the protocol can be found. Analysis results show that the method is efficient and easy to operate and understand.
出处 《计算机工程与应用》 CSCD 2012年第36期116-120,共5页 Computer Engineering and Applications
基金 中国科学院研究生院院长基金(No.Y15102HN00)
关键词 形式化分析 有色Petri网(CPN) 时间戳 安全协议 formal analysis Colored Petri Net (CPN) timestamp security protocols
  • 相关文献

参考文献5

  • 1Gorrieri R, Locatelli E, Martinelli F.A simple langtmge for real-time cryptographic protocol analysis[C]//LNCS 2618: ESOP 2003.Berlin Heidelberg: Springer-Verlag, 2003 : 114-128.
  • 2Jensen K.Coloured Pelri nets:basic concepts, analysis methods and practical use[M].Berlin:Springer-Verlag, 1995.
  • 3Delzanno G,Ganty P.Automatic verification of time sen- sitive cryptographic protocols[C]//LNCS 2988: TACAS. Berlin: Springer, 2004: 342-356.
  • 4Olveczky P C, Grimeland M.Formal analysis of lime-dependent cryptographic protocols in real-time maude[C]//IEEE In- ternational Parallel and Distributed Processing Symposium, 2007:1-8.
  • 5Ma L,Tsai J J P.Formal modeling and analysis of a se- cure mobile-agent system[J].IEEE Transactions on Sys- tems,Man and Cybernetics,Part A,2008,38(1 ) : 180-196.

同被引文献14

  • 1张亚玲,禹勇,王晓峰,王铁英.基于RSA签名的安全数字时间戳方案[J].计算机应用,2005,25(2):381-382. 被引量:4
  • 2朱国东,宁红宙,刘云.基于证书权威(CA)中心的时间戳服务系统的实现[J].中国安全科学学报,2004,14(12):87-90. 被引量:10
  • 3王凯戎.电子病历的法律地位及应用的可行性[J].中华医院管理杂志,2005,21(8):554-557. 被引量:44
  • 4ZHENG Yu-liang. Signcryption and Its Application in Efficient Public Key Solutions [ C ]// ISW ' 97 Proceedings of tile First International Workshop on Infromation Security. Berlin: Springer- Verlag, 1998:291-312.
  • 5Mitomi S , Miyaji A. A Muhisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability [ C ]// ACISP' 00 Proceedings of the 5th Australasian conference on Information Security and Privacy. Tokyo: Springer 2 Veralg, 2000:298-312.
  • 6David Chaum. Blind signature for untraceable payments [ C ]// CRYPTO' 82 Advances in Crypology. New York: Springer, 1983: 199 -203.
  • 7Sattam S AL-Riyami, Kenneth G Paterson. Certificateless public key cryptography [ C ]//Asiacrypt' 03 the 9th International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer-Verlag, 2003 : 452-473.
  • 8Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, et al. Efficient certifieateless signature schemes [ C ]//ACNS ' 07 the 5th International Conference on Applied Cryptography and Network Security. Berlin: Springer-Verlag, 2007 : 443-458.
  • 9苏万力,张跃宇,张晓红,王育民.无证书盲签名方案[J].电子科技大学学报,2009,38(4):533-536. 被引量:6
  • 10俞惠芳,王彩芬.使用自认证公钥的盲签密方案[J].计算机应用研究,2009,26(9):3508-3511. 被引量:4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部