A Formal Model for Analyzing Fair Exchange Protocols Based on Event Logic

被引:0
作者
Yang, Ke [1 ]
Xiao, Meihua [2 ]
Li, Zehuan [1 ]
机构
[1] East China Jiaotong Univ, Sch Elect Engn & Automat, Nanchang 330013, Peoples R China
[2] East China Jiaotong Univ, Sch Software, Nanchang 330013, Peoples R China
来源
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES | 2024年 / 138卷 / 03期
基金
中国国家自然科学基金;
关键词
Fair exchange protocols; fairness; formal analysis; logic reasoning; SECURITY;
D O I
10.32604/cmes.2023.031458
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner. These protocols are widely used in electronic payment systems and electronic contract signing, ensuring the reliability and security of network transactions. In order to address the limitations of current research methods and enhance the analytical capabilities for fair exchange protocols, this paper proposes a formal model for analyzing such protocols. The proposed model begins with a thorough analysis of fair exchange protocols, followed by the formal definition of fairness. This definition accurately captures the inherent requirements of fair exchange protocols. Building upon event logic, the model incorporates the time factor into predicates and introduces knowledge set axioms. This enhancement empowers the improved logic to effectively describe the state and knowledge of protocol participants at different time points, facilitating reasoning about their acquired knowledge. To maximize the intruder's capabilities, channel errors are translated into the behaviors of the intruder. The participants are further categorized into honest participants and malicious participants, enabling a comprehensive evaluation of the intruder's potential impact. By employing a typical fair exchange protocol as an illustrative example, this paper demonstrates the detailed steps of utilizing the proposed model for protocol analysis. The entire process of protocol execution under attack scenarios is presented, shedding light on the underlying reasons for the attacks and proposing corresponding countermeasures. The developed model enhances the ability to reason about and evaluate the security properties of fair exchange protocols, thereby contributing to the advancement of secure network transactions.
引用
收藏
页码:2641 / 2663
页数:23
相关论文
共 35 条
  • [1] Alotaibi A., 2012, International Journal of Computer Networks & Communications, P307, DOI [10.5121/ijcnc.2012.4420, DOI 10.5121/IJCNC.2012.4420]
  • [2] Compositional analysis of contract-signing protocols
    Backes, Michael
    Datta, Anupam
    Derek, Ante
    Mitchell, John C.
    Turuani, Mathieu
    [J]. THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) : 33 - 56
  • [3] Bickford M, 2009, LECT NOTES COMPUT SC, V5582, P140, DOI 10.1007/978-3-642-02414-6_9
  • [4] Blanchet B., 2016, Found. Trends Priv. Secur., V1, P1, DOI DOI 10.1561/3300000004
  • [5] Chawasemerwa T., 2018, International Journal of Research in Industrial Engineering, V7, P396
  • [6] Chen Ming, 2011, Journal of Software, V22, P509, DOI 10.3724/SP.J.1001.2011.03945
  • [7] Clarke E.M., 2018, Handbook of Model checking, DOI [10.1007/978-3-319-10575-8, DOI 10.1007/978-3-319-10575-8]
  • [8] CREMERS Cas., 2008, 3 ACM S INFORM COMPU, P66, DOI DOI 10.1145/1368310.1368324
  • [9] Cremers CJF, 2008, LECT NOTES COMPUT SC, V5123, P414
  • [10] Datta A., 2005, Ph.D. Thesis