Formal Verification of e-Reputation Protocols

被引:1
|
作者
Kassem, Ali [2 ]
Lafourcade, Pascal [1 ]
Lakhnech, Yassine [2 ]
机构
[1] Univ Auvergne, LIMOS, Clermont Ferrand, France
[2] Univ Grenoble Alpes, VERIMAG, CNRS, St Martin Dheres, France
来源
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014) | 2015年 / 8930卷
关键词
Reputation protocols; Formal verification; Privacy; Authentication; Verifiability; Applied pi-calculus; ProVerif; PRIVACY; SYSTEMS;
D O I
10.1007/978-3-319-17040-4_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reputation systems are often useful in large online communities in which most of the users are unknown to each other. They are good tools to force the users to act in truthfulness way. However, for a reputation system to work effectively users have to be willing to provide rates. In order to incentivize the users to provide honest rates, a reputation system have to ensure their privacy and anonymity. Users are also concerned about verifying the correctness of the reputation score. In the applied pi-calculus, we define a formal framework and several fundamental privacy, authentication, and verifiability properties suitable for the security analysis of e-reputation protocols. As proof of concept, using ProVerif, we analyze a simple additive decentralized reputation protocol proposed to ensure rate privacy if all users are honest.
引用
收藏
页码:247 / 261
页数:15
相关论文
共 50 条
  • [41] Formal Verification of a Secure Model for Building E-Learning Systems
    Al Obisat, Farhan M.
    AlRawashdeh, Hazim S.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 377 - 380
  • [42] A Framework for Formal Analysis of Privacy on SSO Protocols
    Wang, Kailong
    Bai, Guangdong
    Dong, Naipeng
    Dong, Jin Song
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 763 - 777
  • [43] Web GUI for Automating the Formal Verification of Security Protocols using Casper & FDR4
    Scurtu, Andreea
    Pura, Mihai-Lica
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI-2019), 2019,
  • [44] A Short Introduction to Two Approaches in Formal Verification of Security Protocols: Model Checking and Theorem Proving
    Pourpouneh, Mohsen
    Ramezanian, Rasoul
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (01): : 3 - 24
  • [45] Formal Analysis on RFIDI Authentication Protocols Against De-Synchronization Attack
    Yeh, Kuo-Hui
    Lo, Nai-Wei
    Kuo, Ren-Zong
    Su, Chunhua
    Chen, Hsuan-Yu
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (04): : 765 - 773
  • [46] Formal Verification of 5G EAP-AKA protocol
    Ajit, Megha
    Sankaran, Sriram
    Jain, Kurunandan
    2021 31ST INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2021, : 140 - 146
  • [47] LFPS: Learned Formal Proof Strengthening for E fficient Hardware Verification
    Kang, Minwoo
    Nova, Azade
    Singh, Eshan
    Bathini, Geetheeka Sharron
    Viktorov, Yuriy
    2023 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2023,
  • [48] Formal Verification of a Keystore
    Boender, Jaap
    Badevic, Goran
    THEORETICAL ASPECTS OF SOFTWARE ENGINEERING, TASE 2022, 2022, 13299 : 49 - 64
  • [49] Formal Verification of Websites
    Flores, Sonia
    Lucas, Salvador
    Villanueva, Alicia
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 200 (03) : 103 - 118
  • [50] Formal verification of μ-charts
    Goldson, D
    APSEC 2002: NINTH ASIA PACIFIC SOFTWARE ENGINEERING CONFERENCE, 2002, : 129 - 136