Formal Verification of e-Reputation Protocols

被引:1
|
作者
Kassem, Ali [2 ]
Lafourcade, Pascal [1 ]
Lakhnech, Yassine [2 ]
机构
[1] Univ Auvergne, LIMOS, Clermont Ferrand, France
[2] Univ Grenoble Alpes, VERIMAG, CNRS, St Martin Dheres, France
来源
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014) | 2015年 / 8930卷
关键词
Reputation protocols; Formal verification; Privacy; Authentication; Verifiability; Applied pi-calculus; ProVerif; PRIVACY; SYSTEMS;
D O I
10.1007/978-3-319-17040-4_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reputation systems are often useful in large online communities in which most of the users are unknown to each other. They are good tools to force the users to act in truthfulness way. However, for a reputation system to work effectively users have to be willing to provide rates. In order to incentivize the users to provide honest rates, a reputation system have to ensure their privacy and anonymity. Users are also concerned about verifying the correctness of the reputation score. In the applied pi-calculus, we define a formal framework and several fundamental privacy, authentication, and verifiability properties suitable for the security analysis of e-reputation protocols. As proof of concept, using ProVerif, we analyze a simple additive decentralized reputation protocol proposed to ensure rate privacy if all users are honest.
引用
收藏
页码:247 / 261
页数:15
相关论文
共 50 条
  • [21] FSM-Based Formal Compliance Verification of Interface Protocols
    Shih, Che-Hua
    Yang, Ya-Ching
    Yen, Chia-Chih
    Huang, Juinn-Dar
    Jou, Jing-Yang
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (05) : 1601 - 1617
  • [22] A formal methodology for integral security design and verification of network protocols
    Diaz, Jesus
    Arroyo, David
    Rodriguez, Francisco B.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2014, 89 : 87 - 98
  • [23] Formal verification of secure group communication protocols modelled in UML
    de Saqui-Sannes, P.
    Villemur, T.
    Fontan, B.
    Mota, S.
    Bouassida, M. S.
    Chridi, N.
    Chrisment, I.
    Vigneron, L.
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2010, 6 (1-2) : 125 - 133
  • [24] A Distributed Formal Model for the Analysis and Verification of Arbitration Protocols on MPSoCs Architecture
    Ben Hafaiedh, Imen
    Ben Slimane, Maroua
    Robbana, Riadh
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016, 2016, 10048 : 658 - 674
  • [25] SeVe: automatic tool for verification of security protocols
    Anh Tuan Luu
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    Li, Xiaohong
    Thanh Tho Quan
    FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (01) : 57 - 75
  • [26] SeVe: automatic tool for verification of security protocols
    Anh Tuan Luu
    Jun Sun
    Yang Liu
    Jin Song Dong
    Xiaohong Li
    Thanh Tho Quan
    Frontiers of Computer Science, 2012, 6 : 57 - 75
  • [27] A Security Formal Verification Method for Protocols Using Cryptographic Contactless Smart Cards
    Henzl, Martin
    Hanacek, Petr
    RADIOENGINEERING, 2016, 25 (01) : 132 - 139
  • [28] HOME: Heard-Of based Formal Modeling and Verification Environment for Consensus Protocols
    Zhai, Shumao
    Li, Xiaozhou
    Ge, Ning
    2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS, ICSE-COMPANION, 2023, : 16 - 20
  • [29] Formal Verification of Privacy Properties in Electric Vehicle Charging
    Fazouane, Marouane
    Kopp, Henning
    van der Heijden, Rens W.
    Le Metayer, Daniel
    Kargl, Frank
    ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 17 - 32
  • [30] Formal Verification of Cryptographic Protocol for Secure RFID System
    Kim, Hyun-Seok
    Oh, Jung-Hyun
    Kim, Ju-Bae
    Jeong, Yeon-Oh
    Choi, Jin-Young
    NCM 2008: 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 470 - 477