期刊文献+

电子商务支付协议认证性的SVO逻辑验证 被引量:7

Verification of e-commerce payment protocol authentication properties based on SVO logic
下载PDF
导出
摘要 与证伪法(如模型检测)相比,采用证真法(如定理证明和逻辑推理)能验证协议在任意会话中的正确性,但分析难度较高,验证过程较为复杂。使用SVO逻辑方法,以Netbill微支付协议为例,对电子商务支付协议的认证性进行形式化分析。扩展了SVO逻辑的公理集;在不影响Netbill协议安全性的前提下,为其建立了简化模型;针对协议特点,修正和补充了其验证目标;给出了比之前更合理的协议假设,展示了具体的推理过程,分析了验证结果。结果表明,Netbill协议基本满足认证性。最后对相关研究工作进行了比较。 Compared with the falsification-oriented approaches(such as model checking), the justification-oriented approaches (such as theorem proof and logic reasoning)can verify the correctness of protocols in unbounded number of sessions. However, those approaches are difficult and the verification process is complicated. Based on the SVO logic, this paper chooses the Netbill micropayment protocol to formally analyze the authentication properties of E-commerce payment pro-tocol. First, the axiom set of SVO is extended. Then, a simplified model of Netbill protocol is proposed without affecting the original security properties. According to the protocol’s characteristic, the verifying goals are improved. Moreover, the more reasonable protocol assumptions than before are given, the detailed reasoning process is showed, and the result is analyzed. The result shows that Netbill protocol satisfies the authentication properties. In the end, a comparison with other related research works is showed.
出处 《计算机工程与应用》 CSCD 2014年第8期6-10,共5页 Computer Engineering and Applications
基金 国家自然科学基金(No.60903054) 国家重点基础研究发展规划(973)(No.2010CB328103) 广东高校优秀青年创新人才培育项目(No.LYM11085 No.LYM11084)
关键词 SVO逻辑 电子商务支付 Netbill协议 认证性 SVO logic e-commerce payment Netbill protocol authentication properties
  • 相关文献

参考文献12

二级参考文献54

  • 1RuiXue Deng-GuoFeng.New Semantic Model for Authentication Protocols in ASMs[J].Journal of Computer Science & Technology,2004,19(4):555-563. 被引量:5
  • 2苏开乐,吕关锋,陈清亮.基于知识结构的认证协议验证[J].中国科学(E辑),2005,35(4):337-351. 被引量:7
  • 3苏开乐,岳伟亚,陈清亮,ZHENG Xi-Zhong.实例化空间:一种新的安全协议验证逻辑的语义模型[J].计算机学报,2006,29(9):1657-1665. 被引量:7
  • 4Lu M A,Jeffrey J P.TSAI Formal verification Techniquesfor Computer Communication Security [EB/OL].http://cite seer.nj.nec.com/463674.html,2003-01-06/2003-05-12.
  • 5Burrows M,Abadi M,Needham R M.A logic of cryptographic [J].ACM Transaction on Computer Systems,1990,8 ( 1 ):18-36.
  • 6Nessett D M.A critique of the burrows,abadi,and needham logic [J].Operating Systems Review,1990,4(2):35-38.
  • 7Camp J,Harkavy M,Tygar J D,et al.Anonymous atomic transactions [EB/OL].http://citese er.nj.nec.com//116043.html,1996-07-03/2003-05-17.
  • 8Snekkenes E.Exploring the BAN approach to protocol analysis[A].Michael Ley.IEEE Symposium on Research in Security and Privacy [C].California:IEEE Computer Society Press,1991.74-78.
  • 9Cox B,Tygar J,Dsirbu M.NetBill Security and Transaction Protocol [EB/OL].http://citeseer.nj.nec.com/cox95netbill.html,2002-03-02/2003-05-07.
  • 10Sirbu M, Tygar J D. NetBill: an internet commerce system optimized for network delivered services [J]. IEEE Personal Communications, 1995, 2(4): 34 - 39

共引文献67

同被引文献63

  • 1肖美华,薛锦云.基于SPIN/Promela的并发系统验证[J].计算机科学,2004,31(8):201-203. 被引量:20
  • 2叶茂,罗万伯.TNC架构的应用研究[J].信息安全与通信保密,2006,28(1):58-60. 被引量:8
  • 3薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:61
  • 4黎波涛,罗军舟.不可否认协议时限性的形式化分析[J].软件学报,2006,17(7):1510-1516. 被引量:13
  • 5吴开贵,陈明.对SVO逻辑方法的改进[J].哈尔滨工程大学学报,2007,28(5):542-547. 被引量:4
  • 6Lu Shiyong, Smolka S A. Model checking the secure electronic transaction (SET) protocol[C]// Proceedings of the 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems. 1999:358-365.
  • 7Holzmann G J. The SPIN Model Checker: Primer and Reference Manual[M].Addison-Wesley, 2003.
  • 8Bella G, Massacci F, Paulson L. Verifying the SET registration protocols[J].IEEE Journal on Selected Areas in Communications, 2003,21(1):77-87.
  • 9Ruiz M C, Cazorla D, Cuartero F, et al. Analysis of the SET E-commerce protocol using a true concurrency process algebra[C]// Proceedings of the 2006 ACM Symposium on Applied Computing. 2006:879-886.
  • 10Xiao M H,Wan Z L, Liu H L.The Formal Verification and Improvement of Simplified SET Protocol[J].Journal of Software,2014,9 (9):2302-2308.

引证文献7

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部