Formal Verification of e-Reputation Protocols

被引:1
|
作者
Kassem, Ali [2 ]
Lafourcade, Pascal [1 ]
Lakhnech, Yassine [2 ]
机构
[1] Univ Auvergne, LIMOS, Clermont Ferrand, France
[2] Univ Grenoble Alpes, VERIMAG, CNRS, St Martin Dheres, France
来源
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014) | 2015年 / 8930卷
关键词
Reputation protocols; Formal verification; Privacy; Authentication; Verifiability; Applied pi-calculus; ProVerif; PRIVACY; SYSTEMS;
D O I
10.1007/978-3-319-17040-4_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reputation systems are often useful in large online communities in which most of the users are unknown to each other. They are good tools to force the users to act in truthfulness way. However, for a reputation system to work effectively users have to be willing to provide rates. In order to incentivize the users to provide honest rates, a reputation system have to ensure their privacy and anonymity. Users are also concerned about verifying the correctness of the reputation score. In the applied pi-calculus, we define a formal framework and several fundamental privacy, authentication, and verifiability properties suitable for the security analysis of e-reputation protocols. As proof of concept, using ProVerif, we analyze a simple additive decentralized reputation protocol proposed to ensure rate privacy if all users are honest.
引用
收藏
页码:247 / 261
页数:15
相关论文
共 50 条
  • [1] Automated Verification of e-Cash Protocols
    Dreier, Jannik
    Kassem, Ali
    Lafourcade, Pascal
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2015, 2016, 585 : 223 - 244
  • [2] Formal Analysis of E-Cash Protocols
    Dreier, Jannik
    Kassem, Ali
    Lafourcade, Pascal
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 65 - 75
  • [3] Formal Verification and Solutions for Estonian E-Voting
    Baloglu, Sevdenur
    Bursuc, Sergiu
    Mauw, Sjouke
    Pang, Jun
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 728 - 741
  • [4] Formal verification and testing of protocols
    Avresky, DR
    COMPUTER COMMUNICATIONS, 1999, 22 (07) : 681 - 690
  • [5] Towards formal verification of IoT protocols: A Review
    Hofer-Schmitz, Katharina
    Stojanovic, Branka
    COMPUTER NETWORKS, 2020, 174
  • [6] Security in Wireless Sensor Networks: A formal verification of protocols
    Nandi, Giann Spilere
    Pereira, David
    Vigil, Martin
    Moraes, Ricardo
    Morales, Analucia Schiaffino
    Araujo, Gustavo
    2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2019, : 425 - 431
  • [7] Formal Verification of Consensus Protocols: Survey and Perspective
    Ge N.
    He Y.-K.
    Zhai S.-M.
    Li X.-Z.
    Zhang L.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (11): : 4989 - 5007
  • [8] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
  • [9] Formal automatic verification of authentication cryptographic protocols
    Debbabi, M
    Mejri, M
    Tawbi, N
    Yahmadi, I
    FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 50 - 59
  • [10] Formal Verification of Security Protocols: ProVerif and Extensions
    Yao, Jiangyuan
    Xu, Chunxiang
    Li, Deshun
    Lin, Shengjun
    Cao, Xingcan
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT II, 2022, 13339 : 500 - 512