详细信息
Verification method of security protocols and its application ( EI收录)
文献类型:会议论文
英文题名:Verification method of security protocols and its application
作者:Chen, Li[1]; Li, Xiaoxue[1]
第一作者:陈莉
通讯作者:Chen, L.|[10484098c9c66]陈莉;
机构:[1] Henan University of Economics and Law, Zhengzhou, Henan, China
第一机构:河南财经政法大学
通讯机构:[1]Henan University of Economics and Law, Zhengzhou, Henan, China|[10484]河南财经政法大学;
会议论文集:Proceedings - 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010
会议日期:29 October 2010 through 31 October 2010
会议地点:Xiamen
语种:英文
外文关键词:Computation theory - Cryptography - Formal methods - Intelligent computing - Network security - Semantics
摘要:The paper researches the typical logic verification methods of security protocols and points out their limitations. Most of them are lack of formal semantics and analysis ability to hybrid cryptography-based primitives. In response on the above-mentioned problems, the paper proposes a new logic verification method, which can analyze most of the known security properties of the e-commerce protocols, such as authentication, secrecy of key, non-repudiation, accountability, fairness and atomicity. The validation of the new logic is verified by analyzing the anonymous e-cash payment protocol and certificated E-mail delivery protocol. The analysis results reveal that the two protocols cannot satisfy the intended security goals. ?2010 IEEE.
参考文献:
正在载入数据...