Advanced Search
Volume 29 Issue 10
Jan.  2011
Turn off MathJax
Article Contents
Zhou Yong, Zhu Wu-jia. A New Verification Method for Non-repudiation Protocol[J]. Journal of Electronics & Information Technology, 2007, 29(10): 2493-2497. doi: 10.3724/SP.J.1146.2006.00384
Citation: Zhou Yong, Zhu Wu-jia. A New Verification Method for Non-repudiation Protocol[J]. Journal of Electronics & Information Technology, 2007, 29(10): 2493-2497. doi: 10.3724/SP.J.1146.2006.00384

A New Verification Method for Non-repudiation Protocol

doi: 10.3724/SP.J.1146.2006.00384
  • Received Date: 2006-03-29
  • Rev Recd Date: 2007-01-26
  • Publish Date: 2007-10-19
  • For the description of the nondeterministic factors in the non-repudiation protocols, the Kailar logic system extended with the default negation and the corresponding reasoning mechanism is introduced. The extended system can be used to verify security protocols and it has several main characteristics. Firstly, the method can reason not only for the results but also for the dynamic procedure of the protocol run. Secondly, the reasoning is nonmonotonic. Thirdly, the ideal assumptions of the protocols can be reduced. Fourthly, the accountability and fairness of the security protocols with some sub-protocols can be analyzed. As an example, a non-repudiation protocol with offline TTP was verified. The protocol has accountability during one protocol run and gets the attack in the repeated runs.
  • loading
  • Abadi M, Glew N, and Horne B. Certified email with a light on-line trusted third party: design and implementation [C].Proceedings of the Eleventh International World Wide Web Conference.Honolulu, Hawaii, USA. 2002: 387-395.[2]Abadi M and Blanchet B. Analyzing security protocols with secrecy types and logic programs[J].Journal of the ACM.2005, 52(1):102-146[3]Gurgens S. On the security of fair non-repudiation protocols[J].International Journal of Information Security.2005, 4(4):253-262[4]Kremer S and Markowitch O. Optimistic non-repudiable information exchange[C]. 21st Symp.on Information Theory in the Benelux.Wassenaar. The Netherlands. 2000: 139-149.[5]Kremer S, Markowitch O, and Zhou J. An intensive survey of non-repudiation protocols[J].Computer Communications.2002, 25(17):1606-1621[6]Kailar R. Accountability in electronic commerce protocols[J]. IEEE Trans. on Software Eng. 1996, 22(5): 313-328.[7]周典萃,卿斯汉,周展飞. Kailar逻辑的缺陷. 软件学报. 1999, 10(12): 1238-1245. Zhou Dian-cui, Qing Si-han, and Zhou Zhan-fei. Limitations of Kailar logic. Journal of Software, 1999,10(12): 1238-1245.[8]卿斯汉. 安全协议. 北京:清华大学出版社. 2005: 190-210. Qing Si-han. Security protocols. Beijing: Tsinghua University Press. 2005: 190-210.[9]周典萃,卿斯汉,周展飞. 一种分析电子商务协议的新工具. 软件学报. 2001, 12(9): 1318-1328. Zhou Dian-cui, Qing Si-han, and Zhou Zhan-fei. A new approach for the analys is of electronic commerce protocols. Journal of Software, 2001,12(9): 1318-1328.[10]Li L, Zhang H, and Wang L. An improved non-repudiation protocol and its securty analysis[J].Wuhan University Journal of Natural Sciences.2004, 9(3):288-292
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2979) PDF downloads(738) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return