Journal on Communications ›› 2012, Vol. 33 ›› Issue (Z2): 189-195.doi: 10.3969/j.issn.1000-436x.2012.z2.026

• Papers • Previous Articles     Next Articles

Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach

Zhi-geng HAN1,Geng CHEN1,Jun-zhou LUO2   

  1. 1 School of Information Science,Nanjing Audit University,Nanjing 211815,China
    2 School of Compute Science and Engineer,Southeast University,Nanjing 211189,China
  • Online:2012-11-25 Published:2017-08-03
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Natural Science Foundation of Jiangsu Educational Committee;The Natural Science Foundation of Jiangsu Educational Committee;Jiangsu Provincial Key Laboratory of Network and Information Security;The Scientific Research Promotion Industrialization Project of Jiangsu Educational Committee;The Jiangsu Provincial Six Talents Peak Project;Nanjing Audit University Talent Introduction Projec

Abstract:

Follow with the methodology of reverse engineering,an exploratory modeling and analysis of security of the typical Kremer-Markowitch multi-party non-repudiation protocol were carried out with a novel method named extended-CSP approach which had been proposed for two-party non-repudiation protocol in preliminary work.With the analysis,the inherent fact that this protocol statisfies not timeliness but non-repudiality and fairness was found successfully.The result of the analysis indicates that,as applying to two-party non-repudiation protocols,the extended-CSP approach can also be a new method for security verification of multi-repudiation protocols.

Key words: formal analysis, multi-party non-repudiation, timeliness, extended-CSP approach

No Suggested Reading articles found!