期刊文献+

公平非否认协议的有限状态分析 被引量:6

Finite-state Analysis of a Fair Non-repudiation Protocol
在线阅读 下载PDF
导出
摘要 本文针对公平非否认协议给出了一种基于有限状态自动机的分析模型,并使用SPIN模型检测工具,对Zhou-Gollmann非否认协议进行了分析,结果发现该协议不满足公平性和机密性,为此对该协议进行了改进。 A model based on finite state automaton is proposed for a fair non-repudiation protocol. The Zhou-Gollmann fair non-repudiation protocol is analyzed with using model checker SPIN. The results show that the protocol isn't satisfied with fairness and confidentiality. Finally, some improvements are given for this protocol.
出处 《计算机科学》 CSCD 北大核心 2005年第8期83-86,共4页 Computer Science
基金 广西自然科学基金(编号:桂科自0229051)
关键词 模型检测 SPIN 非否认性 公平性 机密性 有限状态自动机 非否认协议 状态分析 检测工具 模型 Model checking, SPIN, Nonrepudiation, Fairness, Confidentiality
  • 相关文献

参考文献11

  • 1Zhou J, Gollmann D. A fair non-repudiation protocol. In: IEEE Computer Society Symposium on Research in Security and Privacy, 1996. 55~61.
  • 2Zhou J, Gollmann D. Towards verification of non-repudiation protocols. In: Proc. of 1998 Intl. Refinement Workshop and Formal Methods Pacific, 1998. 370~380.
  • 3Schneider S. Verifying authentication protocols with CSP. In:IEEE Computer Security Foundations Workshop, IEEE, 1997.
  • 4Sigrid , Rudolph C. Security Analysis of (Un-) Fair Non-repudiation Protocols. In: Formal Aspects of Security ( FASec' 02 )Springer Verlag, LNCS, 2002, 2629:97~114.
  • 5董荣胜,郭云川,古天龙.一种电子商务协议原子性的模型检验分析方法[J].计算机科学,2005,32(4):184-186. 被引量:2
  • 6卿斯汉.电子商务协议中的可信第三方角色[J].软件学报,2003,14(11):1936-1943. 被引量:31
  • 7Maggi P, Sisto R. Using SPIN to Verify Security Properties of Cryptographic Protocols. In: SPIN'2002 Workshop, 2002.
  • 8邵晨曦,胡香冬,熊焰,蒋凡.密码协议的SPIN建模和验证[J].电子学报,2002,30(12A):2099-2101. 被引量:4
  • 9Petropoulos D, Kotzanikolaou P. Some more improvements on a fair non-repudiation protocol. Journal of Internet Technology,2002, 4(4).
  • 10Kim K,Park ,Baek J. Improving Fairness and Privacy of ZhouGollmann's Fair Non-repudiation Protocol. In: Proc. of ICPP Workshop on Security(IWSEC), IEEE Computer Society, 1999.140~145.

二级参考文献25

  • 1郭云川,古天龙,董荣胜,蔡国永.电子商务协议形式化分析的一种新方法[J].计算机科学,2004,31(8):86-88. 被引量:1
  • 2卿斯汉.安全协议的设计与逻辑分析.软件学报,2003,14(7):1300~1309.http://www.jos.org.cn/1000-9825/14/1300.htm.,.
  • 3卿斯汉.安全协议20年研究进展.软件学报, 2003,14(10):1740~1752.http://www.jos.org.cn/1000-9825/14/1740.htm.,.
  • 4ISO/IEC 3rd CD 13888-1. Information technology-Security techniques Part 1: General model. ISO/IEC JTC11/SC24 N1274, 1996.
  • 5Burrows M, Abadi M, Needham R. A logic of authentication. ACM Transactions on Computer Systems, 1990,8(1):18-36.
  • 6Kailar R. Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering, 1996,22(5):313-328.
  • 7Coffey T, Saidha P. Non-Repudiation with mandatory proof of receipt. Computer Communication Review, 1996,26(1):6- 17.
  • 8Deng RH, Gong L, Lazar AA, Wang W. Practical protocols for certified electronic mail. Journal of Network and Systems Management, 1996,4(3):279-297.
  • 9Asokan N, Shoup V, Waidner M. Asynchronous protocols for optimistic fair exchange. In: Proceedings of the 1998 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998. 86-99.
  • 10卿斯汉.安全协议20年研究进展.软件学报,2003,14(10):1740-1752[EB/OL].http://www.jos.org.cn/1000-9825/14/1740.htm.,.

共引文献34

同被引文献72

引证文献6

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部