计算机科学 ›› 2021, Vol. 48 ›› Issue (6A): 481-484.doi: 10.11896/jsjkx.200500074
王然然1, 王勇1, 蔡雨桐1, 姜正涛2, 代桂平3
WANG Ran-ran1, WANG Yong1, CAI Yu-tong1, JIANG Zheng-tao2, DAI Gui-ping3
摘要: 通信过程中为了使得通信双方之间的对话过程是安全传输的,在引入可信第三方的基础上,Yahalom协议借助于可信第三方为通信双方分配“好”的会话密钥,利用该共享密钥加密对话内容保证双方对话的安全。Yahalom协议的形式化验证具有很重要的意义。为了使可信第三方在通信双方之间安全地分配会话密钥,文中对通信过程进行理论化形式的验证。文中基于可信平台的随机会话密钥分配过程进行了抽象化的处理,给出了抽象模型中各个实体状态及状态变迁的操作语义描述,建立了Yahalom协议结构化的操作语义并发计算模型,主要通过ACP公理系统对Yahalom协议的状态变迁系统进行了形式化的验证,验证结果表明Yahalom协议系统地展示了期望的外部行为,从理论上证明了基于进程代数的Yahalom协议是可行的。
中图分类号:
[1] CHOO K K R.A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model[J].The Computer Journal,2007,50:591-601. [2] ZAJAC B P.Applied cryptography:Protocols,algorithms,andsource code in C[J].Computers & Security,1994,13(3):217-218. [3] FOKKINK W.Introduction to Process Algebra[J].Texts inTheoretical Computer Science An Eatcs,2000:1-163. [4] VAGLINI G.Communication and concurrency:R Milner Prentice Hall (1989) 260pp 17.95 softback[J].Information and Software Technology,1991,33(6):462. [5] HOARE T,HEARN P O.Separation Logic Semantics for Communicating Processes[J].NULL,2008,212:3-25. [6] BERGSTRA J A,KLOP J W.Algebra of communicating processes with abstraction[J].Theoretical Computer Science,1985,37:77-121. [7] 王勇,许荣强,任兴田,等.可信计算中信任链建立的形式化验证[J].北京工业大学学报,2016,42(3):73-78. [8] 王勇,方娟,任兴田,等.基于进程代数的TCG远程证明协议的形式化验证[J].计算机研究与发展,2013(2):103-109. |
[1] | 蔡雨桐, 王勇, 王然然, 姜正涛, 代桂平. 基于进程代数的Otway-Rees协议的形式化验证 Formal Verification of Otway-Rees Protocol Based on Process Algebra 计算机科学, 2021, 48(6A): 477-480. https://doi.org/10.11896/jsjkx.200500072 |
[2] | 董奇颖, 单轩, 贾春福. 口令Zipf分布对相关安全协议的影响分析 Impact of Zipf's Law on Password-related Security Protocols 计算机科学, 2020, 47(11): 42-47. https://doi.org/10.11896/jsjkx.200500144 |
[3] | 甘勇, 王凯, 贺蕾. 带TTP的多所有者内部权重变化所有权转换协议 Ownership Transfer Protocol for Multi-owners Internal Weight Changes with Trusted Third Party 计算机科学, 2019, 46(6A): 370-374. |
[4] | 张光华, 刘会梦, 陈振国. 云计算环境下基于属性的撤销方案 Attribute-based Revocation Scheme in Cloud Computing Environment 计算机科学, 2018, 45(8): 134-140. https://doi.org/10.11896/j.issn.1002-137X.2018.08.024 |
[5] | 金瑜,蔡超,何亨,李鹏. BTDA:基于半可信第三方的动态云数据更新审计方案 BTDA:Dynamic Cloud Data Updating Audit Scheme Based on Semi-trusted Third Party 计算机科学, 2018, 45(3): 144-150. https://doi.org/10.11896/j.issn.1002-137X.2018.03.023 |
[6] | 林雷蕾,周华,代飞,何臻力,沈勇,康洪炜. 一种基于代数语义的软件体系结构求精方法 Method of Software Architecture Refinement Based on Algebraic Semantics 计算机科学, 2017, 44(7): 141-146. https://doi.org/10.11896/j.issn.1002-137X.2017.07.026 |
[7] | 郑明,李彤,林英,周小煊,李响,明利. 构件系统建模及其动态演化一致性验证方法 Dynamic Evolution Consistency Verification Method for Component System Modeling 计算机科学, 2017, 44(11): 80-86. https://doi.org/10.11896/j.issn.1002-137X.2017.11.012 |
[8] | 王佩雪,周华强. 多租户环境下基于可信第三方的云安全模型研究 Research on Cloud Security Model Based on Trusted Third Party on Multi-tenant Environment 计算机科学, 2014, 41(Z6): 363-365. |
[9] | 谢仲文,李晓燕,李彤,代飞,于倩,张璇. 一种将需求模型转换为软件体系结构模型的方法 Approach of Transformation from Requirements Models to Software Architecture Models 计算机科学, 2014, 41(5): 196-203. https://doi.org/10.11896/j.issn.1002-137X.2014.05.041 |
[10] | 张威. 弱共变-逆变模拟的公理刻画 Axiomatizing Weak Covariant-contravariant Simulation Semantics 计算机科学, 2014, 41(11): 99-102. https://doi.org/10.11896/j.issn.1002-137X.2014.11.019 |
[11] | 朱锐,李彤,莫启,张璇,王一荃,林雷蕾,代飞. 基于EPMM的软件过程行为偏离诊断研究 Research on Deviation Diagnostic of Software Process Behavior Based on EPMM Modelling 计算机科学, 2014, 41(11): 56-62. https://doi.org/10.11896/j.issn.1002-137X.2014.11.012 |
[12] | 李德胜,邓 娜,程 渤,陈俊亮. 一种用于粒子群优化的服务选择的扩展Pi演算 Extended Pi-calculus for Service Selection Using Particle Swarm Optimization 计算机科学, 2012, 39(Z11): 259-269. |
[13] | 王 勇,易 翔,李 凯,刘美林. 可信连接架构的形式化验证 Formal Verification of Trusted Connection Architecture 计算机科学, 2012, 39(Z11): 230-233. |
[14] | 贺靖靖 刘景森 史强 傅慧明. 基于PMI角色模型的匿名认证方案 Anonymous Authentication Scheme Based on Role Model of PMI 计算机科学, 2012, 39(Z11): 33-35. |
[15] | 王精明,虞慧群. 基于安全进程代数的非演绎安全模型的分析与验证 Security Process Algebra-based Analysis and Verification of Non-deducibility Security Model 计算机科学, 2012, 39(2): 56-58. |
|