会议专题

On the Verificaiton of Non-repudiation Protocols

The design of cryptographic protocols is a challenging task as subtle protocol flaws and weaknesses can remain unidentified even after scrupulous checking. In order to provide assurance that a protocol is verifiable secure and trustworthy, it is necessary to perform a formal verification on its design specification. Non-repudiation plays an increasingly significant role in electronic commerce, protecting the transacting parties against any false denial that a particular event or action has taken place. The application of formal verification techniques on non-repudiation protocols is not straightforward, as these protocols need to satisfy non-repudiation requirements while achieving security goals. In this paper, a logic-based method is proposed to formally analyze and verify nonrepudiation protocols. The proposed method utilizes the CS logic taking its advantage of time-indexed protocol verification. Extensions to CS logic are introduced to meet the requirements for analyzing non-repudiation protocols. As a case study, a nonrepudiation protocol is formally verified using the extended logic.

Security Protocol Verification Non-repudiation

Chunxiao Liu

School of Electronics and Information Engineering Liaoning University of Technology Liaoning, China

国际会议

2011 3rd International Conference on Computer and Network Technology(ICCNT 2011)(2011第三届IEEE计算机与网络技术国际会议)

太原

英文

367-371

2011-02-26(万方平台首次上网日期,不代表论文的发表时间)