Formal analysis and design of multi-party fair exchange protocols

被引:0
|
作者
Sihan Qing
Gaicheng Li
机构
[1] Chinese Academy of Sciences,Engineering Research Center for Information Security Technology, Institute of Software
[2] Beijing Zhongke Ansheng Corporation of Information Technology,undefined
[3] Graduate School of the Chinese Academy of Sciences,undefined
来源
Science in China Series F: Information Sciences | 2006年 / 49卷
关键词
fair exchange; logical protocol; formal model; security requirement;
D O I
暂无
中图分类号
学科分类号
摘要
Based on the origin of message items and channel combination between transacting parties, and events and relations among events, this paper presents a concise, precise, and hierarchical model for general fair exchange protocols, formally specifies various security requirements which are able to reflect inherent requirements for fair exchange protocols more rigorously, and partition these security requirements with fine granularity. This work helps analyze, debug, and design multi-party fair exchange protocols more effectively and elaborately.
引用
收藏
页码:155 / 174
页数:19
相关论文
共 31 条
  • [21] MULTI-ITEM FAIR EXCHANGE SCHEME
    Zheng Dong Chen Kefei (Dept. of Computer Science Engineering
    JournalofElectronics(China), 2002, (04) : 363 - 368
  • [22] Avoiding loss of fairness owing to process crashes in fair data exchange protocols
    Liu, P
    Ning, P
    Jajodia, S
    DSN 2000: INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2000, : 631 - 640
  • [23] Optimistic fair exchange in a multi-user setting
    Dodis, Yeveniy
    Lee, Pil Joong
    Yum, Dae Hyun
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2008, 14 (03) : 318 - 346
  • [24] A formal methodology for integral security design and verification of network protocols
    Diaz, Jesus
    Arroyo, David
    Rodriguez, Francisco B.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2014, 89 : 87 - 98
  • [25] A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-Repudiation Proofs
    Grimm, Ruediger
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 49 - 56
  • [26] A Formal Model For Multi-Protocol Analysis
    Gu, Wen
    Han, Ji-Hong
    Yuan, Lin
    2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 2559 - 2562
  • [27] Multi-Party E-Commerce Protocol for B2C/B2B Applications
    Birjoveanu, Catalin, V
    Birjoveanu, Mirela
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 1: DCNET, ICE-B, OPTICS, SIGMAP AND WINSYS (ICETE), 2019, : 164 - 171
  • [28] Fair Exchange E-Commerce Protocol for Multi-Chained Complex Transactions
    Birjoveanu, Catalin, V
    Birjoveanu, Mirela
    ICE-B: PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 3: ICE-B, 2020, : 49 - 60
  • [29] A lightweight and secure NFC-base mobile payment protocol ensuring fair exchange based on a hybrid encryption algorithm with formal verification
    Thammarat, Chalee
    Kurutach, Werasak
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (12)
  • [30] Novel Design of Fair Exchange Protocol for Semi-trusted Server and Its Application in Cloud Environment
    Wang, Chih-Hung
    Wang, Chien-Ming
    2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2016, : 130 - 135