A novel formal logic for formal analysis of timeliness in non-repudiation protocols

被引:2
|
作者
Yang, Ke [1 ]
Xiao, Meihua [1 ]
Zhong, Xiaomei [1 ]
Zhong, Yingqiang [1 ]
机构
[1] East China Jiaotong Univ, Sch Software, Nanchang 330013, Peoples R China
关键词
Non -repudiation protocols; Timeliness; Formal analysis; Logic reasoning; SECURITY; VERIFICATION;
D O I
10.1016/j.jksuci.2023.101664
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-repudiation protocols are aimed at exchanging digital messages and irrefutable receipts between two mistrusting parties over the Internet, which form the cornerstones of modern secure network transactions. Timeliness is a key security property of non-repudiation protocols, which ensures that protocol agents can terminate their execution within a finite time, and guarantees the satisfaction of timeconstraint among protocol events. A number of analysis methods have been proposed, but most of them cannot explicitly express the time factor which plays an important role in protocols. In order to address the challenge of analyzing timeliness, this paper extends the logic of events theory (LoET) and proposes a novel formal logic. By explicitly introducing the time factor into predicate formulas, the new logic can model actions, knowledge, and process states of each agent at different time points, thus enhancing its ability of time description. The formal semantics of new logic is given to avoid ambiguity of logic language and guarantee the soundness of new logic. A typical non-repudiation protocol is analyzed with new logic, and the timeliness flaw is discovered. The proposed logic overcomes the limitations of LoET in terms of time description and effectively addresses the issue of the inability to analyze timeliness. (c) 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:17
相关论文
共 50 条
  • [41] A game-based verification of non-repudiation and fair exchange protocols
    Kremer, Steve
    Raskin, Jean-François
    Journal of Computer Security, 2003, 11 (03) : 399 - 429
  • [42] Formal analysis of cryptographic protocols in a knowledge algorithm logic framework
    State Key Laboratory for Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    不详
    Chin J Electron, 2007, 4 (701-706):
  • [43] Formal analysis of cryptographic protocols in a knowledge algorithm logic framework
    Xiao, Meihua
    Xue, Jinyun
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (04): : 701 - 706
  • [44] The study on the application of BAN logic in formal analysis of authentication protocols
    Wen, Jinghua
    Zhang, Mei
    Li, Xiang
    Seventh International Conference on Electronic Commerce, Vols 1 and 2, Selected Proceedings, 2005, : 744 - 747
  • [45] Formal analysis of timeliness in the RaSTA protocol
    Naumann, Billy
    Jakobs, Christine
    Werner, Matthias
    PROCEEDINGS OF THE 2022 17TH CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENCE SYSTEMS (FEDCSIS), 2022, : 505 - 514
  • [46] Non-repudiation analysis using LYSA with annotations
    Bruso, Mayla
    Cortesi, Agostino
    COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2010, 36 (04) : 352 - 377
  • [47] A theorem-proving approach to verification of fair non-repudiation protocols
    Wei, Kun
    Heather, James
    FORMAL ASPECTS IN SECURITY AND TRUST, 2007, 4691 : 202 - +
  • [48] An Improved Non-Repudiation Protocol and Its Security Analysis
    Li Li 1
    2.State Key Laboratory of Software Engineering
    Wuhan University Journal of Natural Sciences, 2004, (03) : 288 - 292
  • [49] An improved non-repudiation protocol and its security analysis
    Li, Li
    Zhang, Huan-Guo
    Wang, Li-Na
    Wuhan University Journal of Natural Sciences, 2004, 9 (03) : 288 - 292
  • [50] Generic non-repudiation protocols supporting transparent off-line TTP
    Wang, Guilin
    JOURNAL OF COMPUTER SECURITY, 2006, 14 (05) : 441 - 467