Formal Method for Security Analysis of Electronic Payment Protocols

被引:0
作者
Liu, Yi [1 ]
Meng, Qingkun [1 ]
Liu, Xingtong [1 ]
Wang, Jian [1 ]
Zhang, Lei [1 ]
Tang, Chaojing [1 ]
机构
[1] Natl Univ Def Technol, Coll Elect Sci, Changsha 410073, Hunan, Peoples R China
关键词
electronic payment protocol; formal analysis; accountability; fairness; timeliness; logical reasoning;
D O I
10.1587/transinf.2018EDP7108
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic payment protocols provide secure service for electronic commerce transactions and protect private information from malicious entities in a network. Formal methods have been introduced to verify the security of electronic payment protocols; however, these methods concentrate on the accountability and fairness of the protocols, without considering the impact caused by timeliness. To make up for this deficiency, we present a formal method to analyze the security properties of electronic payment protocols, namely, accountability, fairness and timeliness. We add a concise time expression to an existing logical reasoning method to represent the event time and extend the time characteristics of the logical inference rules. Then, the Netbill protocol is analyzed with our formal method, and we find that the fairness of the protocol is not satisfied due to the timeliness problem. The results illustrate that our formal method can analyze the key properties of electronic payment protocols. Furthermore, it can be used to verify the time properties of other security protocols.
引用
收藏
页码:2291 / 2297
页数:7
相关论文
共 25 条
[1]   Verifying the SET purchase protocols [J].
Bella, Giampaolo ;
Massacci, Fabio ;
Paulson, Lawrence C. .
JOURNAL OF AUTOMATED REASONING, 2006, 36 (1-2) :5-37
[2]   A PROGRAM LOGIC FOR VERIFYING SECURE ROUTING PROTOCOLS [J].
Chen, Chen ;
Jia, Limin ;
Xu, Hao ;
Luo, Cheng ;
Zhou, Wenchao ;
Loo, Boon Thau .
LOGICAL METHODS IN COMPUTER SCIENCE, 2015, 11 (04)
[3]  
Chen L., 2010, COMPUTER SCI
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]  
Dreier J, 2015, 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, P65
[6]  
Gao Y., 2013, J CONVERGENCE INFORM
[7]  
Guo H., 2010, COMPUTER SCI
[8]  
Guo Y., 2009, J COMMUNICATIONS
[9]   State and Progress in Strand Spaces: Proving Fair Exchange [J].
Guttman, Joshua D. .
JOURNAL OF AUTOMATED REASONING, 2012, 48 (02) :159-195
[10]   Accountability in electronic commerce protocols [J].
Kailar, R .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (05) :313-328