期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A formal model of fair exchange protocols 被引量:9
1
作者 QING Sihan1,2,3 & LI Gaicheng1,2,3 1. Engineering Research Center for information Security technology, Institute of Software, Chinese Aca- demy of Sciences, beijing 100080, china 2. beijing zhongke ansheng corporation of information technology, beijing 100080, china 3. Graduate School of the Chinese Academy of Sciences, beijing 100039, china 《Science in China(Series F)》 2005年第4期499-512,共14页
Based on the study of existing fair exchange protocols, this paper sets up an accurate formal model by stepwise refinement. In the process of refinement an unreliable channel is employed to simulate an attack behavior... Based on the study of existing fair exchange protocols, this paper sets up an accurate formal model by stepwise refinement. In the process of refinement an unreliable channel is employed to simulate an attack behavior. The model provides a novel formal definition of exchanged items, and presents the formal goals for fairness, accountability, etc., reflecting the inherent requirements for fair exchange protocols across-the-board. In order to check, prove, and design fair exchange protocols effectively and efficiently, the model puts forward a novel property of abuse-freeness which applies to all fair exchange protocols, gives a formal definition for trust strand of the third party, and presents general criteria of designing a secure and effective fair exchange protocol. Taking a typical fair exchange protocol as an example, this paper presents the analysis steps of fair exchange protocols appealing to our model. An unknown attack is uncovered. The analysis reveals the process of a complete attack, discovering deeper reasons for causing an attack. Finally, we modify the flawed protocol and the revised protocol ensures the desirable properties. 展开更多
关键词 EVENTS local causal relation local temporal relation global relation exchanged item security goals.
原文传递
Formal analysis and design of multi-party fair exchange protocols
2
作者 QING Sihan1,2,3 & LI Gaicheng1,3 1. Engineering Research Center for information Security technology, Institute of Software, Chinese Academy of Sciences, beijing 100080, china 2. beijing zhongke ansheng corporation of information technology, beijing 100080, china 3. Graduate School of the Chinese Academy of Sciences, beijing 100039, china 《Science in China(Series F)》 2006年第2期155-174,共20页
Based on the origin of message items and channel combination between transacting parties, and events and relations among events, this paper presents a concise, precise, and hierarchical model for general fair exchange... Based on the origin of message items and channel combination between transacting parties, and events and relations among events, this paper presents a concise, precise, and hierarchical model for general fair exchange protocols, formally specifies various security requirements which are able to reflect inherent requirements for fair exchange protocols more rigorously, and partition these security requirements with fine granularity. This work helps analyze, debug, and design multi-party fair exchange protocols more effectively and elaborately, 展开更多
关键词 fair exchange logical protocol formal model security requirement.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部