On-the-fly model checking of fair non-repudiation Protocols

被引:0
|
作者
Li, Guoqiang [1 ]
Ogawa, Mizuhito [1 ]
机构
[1] Japan Adv Inst Sci & Technol, Nomi, Ishikawa 9231292, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A fair non-repudiation protocol should guarantee, (1) when a sender sends a message to a receiver, neither the sender nor the receiver can deny having participated in this communication; (2) no principals can obtain evidence while the other principals cannot do so. This paper extends the model in our previous work [12], and gives a sound and complete on-the-fly model checking method for fair non-repudiation protocols under the assumption of a bounded number of sessions. We also implement the method using Maude. Our experiments automatically detect flaws of several fair non-repudiation protocols.
引用
收藏
页码:511 / +
页数:2
相关论文
共 50 条
  • [41] A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing
    Ruiz-Martinez, Antonio
    Inmaculada Marin-Lopez, C.
    Bano-Lopez, Laura
    Gomez-Skarmeta, Antonio F.
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (03) : 555 - 583
  • [42] RFID-Based Non-repudiation Protocols for Supply Chains
    Piramuthu, Selwyn
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2017, 2017, 759 : 56 - 69
  • [43] Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder
    Klay, Francis
    Vigneron, Laurent
    FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 192 - +
  • [44] Evidence and non-repudiation
    National University, Singapore, Singapore
    不详
    J Network Comput Appl, 3 (267-281):
  • [45] A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-Repudiation Proofs
    Grimm, Ruediger
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 49 - 56
  • [46] A novel formal logic for formal analysis of timeliness in non-repudiation protocols
    Yang, Ke
    Xiao, Meihua
    Zhong, Xiaomei
    Zhong, Yingqiang
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (08)
  • [47] A Fair Non-Repudiation Security Protocol with off-line TTP
    Wang, Xi
    Wen, Xiangming
    Liu, Ye
    Lin, Xinqi
    Wang, Ying
    PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATION, LOGISTICS AND INFORMATICS, 2009, : 173 - +
  • [48] Observations on non-repudiation
    Lect Notes Comput Sci, (133):
  • [49] An efficient non-repudiation protocol
    Zhou, JY
    Gollmann, D
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 126 - 132
  • [50] An extended strand space method for fairness analysis of non-repudiation protocols
    Li, Lei
    Chen, Jing
    Wang, Yumin
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2010, 44 (06): : 16 - 20