期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Design and formal verification of a CEM protoco with transparent TTP 被引量:1
1
作者 Zhiyuan LIU Jun PANG Chenyi ZHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第2期279-297,共19页
In certified email (CEM) protocols, trusted third party (TTP) transparency is an important security require- ment which helps to avoid bad publicity as well as protecting individual users' privacy. Cederquist et ... In certified email (CEM) protocols, trusted third party (TTP) transparency is an important security require- ment which helps to avoid bad publicity as well as protecting individual users' privacy. Cederquist et al. proposed an opti- mistic certified email protocol, which employs key chains to reduce the storage requirement of the TTE We extend their protocol to satisfy the property of TTP transparency, using existing verifiably encrypted signature schemes. An imple- mentation with the scheme based on bilinear pairing makes our extension one of the most efficient CEM protocols satis- fying strong fairness, timeliness, and TTP transparency. We formally verify the security requirements of the extended pro- tocol. The properties of fairness, timeliness and effectiveness are checked in the model checker Mocha, and TTP trans- parency is formalised and analysed using the toolsets/~CRL and CADE 展开更多
关键词 fair exchange CEM protocols FAIRNESS ttptransparency formal verification
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部