通信学报 ›› 2012, Vol. 33 ›› Issue (Z2): 189-195.doi: 10.3969/j.issn.1000-436x.2012.z2.026

• 学术论文 • 上一篇    下一篇

多方不可否认协议的增广CSP建模与分析

韩志耕1,陈耿1,罗军舟2   

  1. 1 南京审计学院 信息科学学院,江苏 南京 211815
    2 东南大学 计算机科学与工程学院,江苏 南京 211189
  • 出版日期:2012-11-25 发布日期:2017-08-03
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;江苏省高校自然科学基金资助项目;江苏省高校自然科学基金资助项目;江苏省网络与信息安全重点实验室基金资助项目;江苏省高校科研成果产业化推进工程基金资助项目;江苏省六大人才高峰基金资助项目;南京审计学院人才引进基金资助项目

Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach

Zhi-geng HAN1,Geng CHEN1,Jun-zhou LUO2   

  1. 1 School of Information Science,Nanjing Audit University,Nanjing 211815,China
    2 School of Compute Science and Engineer,Southeast University,Nanjing 211189,China
  • Online:2012-11-25 Published:2017-08-03
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Natural Science Foundation of Jiangsu Educational Committee;The Natural Science Foundation of Jiangsu Educational Committee;Jiangsu Provincial Key Laboratory of Network and Information Security;The Scientific Research Promotion Industrialization Project of Jiangsu Educational Committee;The Jiangsu Provincial Six Talents Peak Project;Nanjing Audit University Talent Introduction Projec

摘要:

基于逆向工程的思想,使用前期工作中提出的面向两方不可否认协议分析的增广CSP方法,对典型的Kremer-Markowitch多方不可否认协议的安全性进行了探索性建模与分析。借助该分析成功发现此协议在满足不可否认性和公平性的同时却不具备时限性。这表明在适用于两方不可否认协议安全性验证的同时,增广CSP方法也可作为多方不可否认协议安全性验证的新方法。

关键词: 形式化分析, 多方不可否认, 时限性, 增广CSP方法

Abstract:

Follow with the methodology of reverse engineering,an exploratory modeling and analysis of security of the typical Kremer-Markowitch multi-party non-repudiation protocol were carried out with a novel method named extended-CSP approach which had been proposed for two-party non-repudiation protocol in preliminary work.With the analysis,the inherent fact that this protocol statisfies not timeliness but non-repudiality and fairness was found successfully.The result of the analysis indicates that,as applying to two-party non-repudiation protocols,the extended-CSP approach can also be a new method for security verification of multi-repudiation protocols.

Key words: formal analysis, multi-party non-repudiation, timeliness, extended-CSP approach

No Suggested Reading articles found!