A novel formal logic for formal analysis of timeliness in non-repudiation protocols

被引:2
|
作者
Yang, Ke [1 ]
Xiao, Meihua [1 ]
Zhong, Xiaomei [1 ]
Zhong, Yingqiang [1 ]
机构
[1] East China Jiaotong Univ, Sch Software, Nanchang 330013, Peoples R China
关键词
Non -repudiation protocols; Timeliness; Formal analysis; Logic reasoning; SECURITY; VERIFICATION;
D O I
10.1016/j.jksuci.2023.101664
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-repudiation protocols are aimed at exchanging digital messages and irrefutable receipts between two mistrusting parties over the Internet, which form the cornerstones of modern secure network transactions. Timeliness is a key security property of non-repudiation protocols, which ensures that protocol agents can terminate their execution within a finite time, and guarantees the satisfaction of timeconstraint among protocol events. A number of analysis methods have been proposed, but most of them cannot explicitly express the time factor which plays an important role in protocols. In order to address the challenge of analyzing timeliness, this paper extends the logic of events theory (LoET) and proposes a novel formal logic. By explicitly introducing the time factor into predicate formulas, the new logic can model actions, knowledge, and process states of each agent at different time points, thus enhancing its ability of time description. The formal semantics of new logic is given to avoid ambiguity of logic language and guarantee the soundness of new logic. A typical non-repudiation protocol is analyzed with new logic, and the timeliness flaw is discovered. The proposed logic overcomes the limitations of LoET in terms of time description and effectively addresses the issue of the inability to analyze timeliness. (c) 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Towards verification of timed non-repudiation protocols
    Wei, K
    Heather, J
    FORMAL ASPECTS IN SECURITY AND TRUST, 2006, 3866 : 244 - 257
  • [22] Automated Design of Non-repudiation Security Protocols
    Xue, Haifeng
    Zhang, Huanguo
    Qing, Sihan
    Yu, Rongwei
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2318 - +
  • [23] An intensive survey of fair non-repudiation protocols
    Kremer, S
    Markowitch, O
    Zhou, JY
    COMPUTER COMMUNICATIONS, 2002, 25 (17) : 1606 - 1621
  • [24] Security analysis of (un-) fair non-repudiation protocols
    Gürgens, S
    Rudolph, C
    FORMAL ASPECTS OF SECURITY, 2003, 2629 : 97 - 114
  • [25] Extended-CSP based analysis of non-repudiation protocols
    School of Computer Science and Engineering, Southeast University, Nanjing 210096, China
    Tongxin Xuebao, 2008, 10 (8-18): : 8 - 18
  • [26] Security analysis of efficient (Un-) fair non-repudiation protocols
    Gürgens, S
    Rudolph, C
    FORMAL ASPECTS OF COMPUTING, 2005, 17 (03) : 260 - 276
  • [27] Non-repudiation Analysis with LYSA
    Bruso, Mayla
    Cortesi, Agostino
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST, 2009, 297 : 318 - 329
  • [28] An extended strand space method for fairness analysis of non-repudiation protocols
    Li, Lei
    Chen, Jing
    Wang, Yumin
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2010, 44 (06): : 16 - 20
  • [29] A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-Repudiation Proofs
    Grimm, Ruediger
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 49 - 56
  • [30] Game-based analysis of multi-party non-repudiation protocols
    Wang Xueming
    Li Xiang
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 642 - +