Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking

被引:0
|
作者
Saha, Indranil [1 ]
Mukhopadhyay, Debapriyay [2 ]
机构
[1] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90095 USA
[2] Rebaca Technol Pvt Ltd, Kolkata, India
来源
INFORMATION SYSTEMS SECURITY, PROCEEDINGS | 2009年 / 5905卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the probabilistic non-repudiation protocol without a trusted third party as presented in [5], the recipient of a service can cheat the originator of the service with some probability. This probability indicates the degree of fairness of the protocol and is referred as epsilon-fairness. In this paper, we analyze the protocol quantitatively through probabilistic model checking. The c-fairness is quantitatively measured by modeling the protocol in PRISM model checker and verifying appropriate property specified in PCTL. Moreover, our analysis gives proper insight to choose proper values for different parameters associated with the protocol in such a way that certain degree of fairness can be achieved and therefore answers the reverse question, given the degree of fairness epsilon, how should one choose the protocol parameters to ensure fairness.
引用
收藏
页码:292 / +
页数:3
相关论文
共 50 条
  • [1] Automatic Analysis of a Non-Repudiation Protocol
    Lanotte, Ruggero
    Maggiolo-Schettini, Andrea
    Troina, Angelo
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 113 - 129
  • [2] Optimistic non-repudiation protocol analysis
    Santiago, Judson
    Vigneron, Laurent
    INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 90 - +
  • [3] Formal analysis of a non-repudiation protocol
    Schneider, S
    11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 54 - 65
  • [4] An efficient non-repudiation protocol
    Zhou, JY
    Gollmann, D
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 126 - 132
  • [5] A fair non-repudiation protocol
    Meng, B
    Wang, SM
    Xiong, QX
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON CSCW IN DESIGN, 2002, : 68 - 73
  • [6] Formal analysis of non-repudiation protocol by spi
    Li, Yuan
    Jiang, Jian-Guo
    Wang, Huan-Bao
    Tongxin Xuebao/Journal on Communications, 2009, 30 (05): : 94 - 98
  • [7] A Fair Non-Repudiation Protocol
    Meng, B. (mengbo@263.net.cn), FAPERJ; SBC; UFRI; IEEE; COPPETEC FUNDACAO (Institute of Electrical and Electronics Engineers Inc.):
  • [8] On-the-fly model checking of fair non-repudiation Protocols
    Li, Guoqiang
    Ogawa, Mizuhito
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2007, 4762 : 511 - +
  • [9] A fair non-repudiation protocol
    Zhou, JY
    Gollmann, D
    1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 55 - 61
  • [10] An Improved Non-Repudiation Protocol and Its Security Analysis
    Li Li 1
    2.State Key Laboratory of Software Engineering
    Wuhan University Journal of Natural Sciences, 2004, (03) : 288 - 292