A novel formal logic for formal analysis of timeliness in non-repudiation protocols

被引:2
|
作者
Yang, Ke [1 ]
Xiao, Meihua [1 ]
Zhong, Xiaomei [1 ]
Zhong, Yingqiang [1 ]
机构
[1] East China Jiaotong Univ, Sch Software, Nanchang 330013, Peoples R China
关键词
Non -repudiation protocols; Timeliness; Formal analysis; Logic reasoning; SECURITY; VERIFICATION;
D O I
10.1016/j.jksuci.2023.101664
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-repudiation protocols are aimed at exchanging digital messages and irrefutable receipts between two mistrusting parties over the Internet, which form the cornerstones of modern secure network transactions. Timeliness is a key security property of non-repudiation protocols, which ensures that protocol agents can terminate their execution within a finite time, and guarantees the satisfaction of timeconstraint among protocol events. A number of analysis methods have been proposed, but most of them cannot explicitly express the time factor which plays an important role in protocols. In order to address the challenge of analyzing timeliness, this paper extends the logic of events theory (LoET) and proposes a novel formal logic. By explicitly introducing the time factor into predicate formulas, the new logic can model actions, knowledge, and process states of each agent at different time points, thus enhancing its ability of time description. The formal semantics of new logic is given to avoid ambiguity of logic language and guarantee the soundness of new logic. A typical non-repudiation protocol is analyzed with new logic, and the timeliness flaw is discovered. The proposed logic overcomes the limitations of LoET in terms of time description and effectively addresses the issue of the inability to analyze timeliness. (c) 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:17
相关论文
共 50 条
  • [1] A formal treatment of non-repudiation protocols
    Hada, S
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (02) : 461 - 470
  • [2] A formal analysis of non-repudiation protocols based on first-order logic
    Yudan, Fan
    Jihong, Han
    Yadi, Wang
    Yu, Zhao
    Kai, Liao
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 6580 - 6583
  • [3] Formal analysis of multi-party non-repudiation protocols
    Wang Xue-Ming
    Li Xiang
    Proceedings of e-ENGDET2006, 2006, : 89 - 93
  • [4] Formal analysis of a non-repudiation protocol
    Schneider, S
    11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 54 - 65
  • [5] A formal analysis of CORBA non-repudiation
    Zheng, H
    Song, GX
    International Conference on Computing, Communications and Control Technologies, Vol 6, Post-Conference Issue, Proceedings, 2004, : 401 - 405
  • [6] Formal analysis of non-repudiation protocol by spi
    Li, Yuan
    Jiang, Jian-Guo
    Wang, Huan-Bao
    Tongxin Xuebao/Journal on Communications, 2009, 30 (05): : 94 - 98
  • [7] Fair non-repudiation protocol and its formal analysis
    Liu, Jing
    Zhou, Ming-Tian
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2003, 31 (09): : 1422 - 1425
  • [8] Non-repudiation protocol for E-mail and its formal analysis
    Peng, Hongyan
    Li, Xiaojian
    Xia, Chunhe
    Deng, Jianfeng
    Zhou, Xiaofa
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006, 43 (11): : 1914 - 1919
  • [9] Fair non-repudiation cryptographic protocol and its formal analysis and applications
    Lin, X.X. (lixx@cscw.buaa.edu.cn), 1628, Chinese Academy of Sciences (11):
  • [10] Formal Analysis and Improvement of Multi-party Non-repudiation Protocol
    Wang, Xueming
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4120 - 4123