Computer Science ›› 2018, Vol. 45 ›› Issue (7): 143-149.doi: 10.11896/j.issn.1002-137X.2018.07.024

• Information Security • Previous Articles     Next Articles

Reliable Logic Analysis Method of Multi-party Non-repudiation Protocol

YUAN Bo-ao, LIU Jun   

  1. College of Command Information Systems,Army Engineering University of PLA,Nanjing 210007,China
  • Received:2017-05-29 Online:2018-07-30 Published:2018-07-30

Abstract: Multi-party non-repudiation protocol needs to meet three main security goals of non-repudiation,fairness and timeliness,but the existing formal analysis methods for multi-party non-repudiation proctocol are just simple extensions of those applied to two-party protocols.At the same time,each method can not cover all three security goals and has limited ability to analyze one goal with result unreliable.In this paper,the existing analysis methods were compared and the SVO logic was chosen for further study.Time factor was introduced in the logic system with relevant syntax definition and deduction axioms brought in explicitly.Then,the semantic model of the improved logic was stated and the soundness of logic system was proved,causing that the improved logic system can support the analysis of all three secu-rity goals of multi-party non-repudiation protocol.In the end,a typical multi-party non-repudiation protocol was analyzed with the improved logic and the defects of timeliness and fairness were found with corresponding attacks stated.Among the defects,the defect of fairness was discovered for the first time.

Key words: Fairness, Multi-party non-repudiation protocol, SVO logic, Timeliness

CLC Number: 

  • TP309
[1]FENG D G,FAN H.Survey on Theories and Methods of Formal Analysis for Security Protocols[J].Journal of the Graduate School of the Chinese Academy of Sciences,2003,20(4):389-406.(in Chinese)
冯登国,范红.安全协议形式化分析理论与方法研究综述[J].中国科学院研究生院学报,2003,20(4):389-406.
[2]ZHOU J,GOLLMAN D.A fair non-repudiation protocol[C]∥Proceedings of the 1996 IEEE Symposium on Security and Privacy.Oakland:IEEE Computer Society Press,1996:55-61.
[3]KREMER S,MARKOWITCH O.A multi-party non-repudiation protocol[C]∥15th International Conference on Information Security(SEC 2000).Beijing:Kluwer,2000:271-280.
[4]KREMER S,MARKOWITCH O.Fair multi-party non-repudiation protocols[J].International Journal of Information Security,2003,1(4):223-235.
[5]ONIEVA J A,ZHOU J,CARBONELL M,et al.A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages[M].Boston:Springer,2003:37-48.
[6]HAN Z G,LUO J Z.Analysis and Improvement of Timeliness ofa Multi-Party Non-Repudiation Protocol[J].Acta Electronica Sinica,2009,37(2):377-381.(in Chinese)
韩志耕,罗军舟.多方不可否认协议时限性分析与改进[J].电子学报,2009,37(2):377-381.
[7]WANG X,WANG X.Formal Analysis Of Multi-party Non-repudiation Protocols Without TTP[C]∥International Conference on Communications and Intelligence Information Security.Nanning:IEEE Computer Society Press,2010:96-99.
[8]WANG X M,WENG L C.Analysis and Improvement of A Fair Multi-party Non-repudiation Protocol Based on ATL Logic[J].Information Security and Technology,2011,2(9):21-25.(in Chinese)
汪学明,翁立晨.基于ATL逻辑的公平多方不可否认协议的分析与改进[J].信息安全与技术,2011,2(9):21-25.
[9]LI L,WANG L,CHEN J,et al.Fairness Analysis for Multiparty Nonrepudiation Protocols Based on Improved Strand Space[J].Discrete Dynamics in Nature & Society,2014,17(1):1-7.
[10]SYVERSON P F,VAN O P C.A Unified Cryptographic Protocol Logic[R].Washington:Naval Research Lab,1996.
[11]LEI X F,XUE R.The Logic Methods of Cryptographic Protocol Analysis[M].Beijing:Science Press,2013:154-159.(in Chinese)
雷新锋,薛锐.密码协议分析的逻辑方法[M].北京:科学出版社,2013:154-159.
[12]WANG Y M.The Application Study on Formalism of Multi-Party Non-Repudiation Protocols on SVO Logic[D].Guiyang:Guizhou University,2009.(in Chinese)
王远敏.基于SVO逻辑的多方不可否认协议的形式化分析与研究[D].贵阳:贵州大学,2009.
[13]HE B,LI X J,XIA C H,et al.A Fair Multi-Party Non-Repudiation Protocol[J].Computer Engineering and Applications,2005,41(27):120-122.(in Chinese)
何冰,李肖坚,夏春和,等.公平的多方不可否认协议[J].计算机工程与应用,2005,41(27):120-122.
[14]HAN Z G,LUO J Z.A Fair Multi-Party Non-Repudiation Protocol[J].Chinese Journal of Computers,2008,31(10):1705-1715.(in Chinese)
韩志耕,罗军舟.一个公平的多方不可否认协议[J].计算机学报,2008,31(10):1705-1715.
[1] WEI Hong-ru, LI Si-yue, GUO Yong-hao. Secret Reconstruction Protocol Based on Smart Contract [J]. Computer Science, 2022, 49(6A): 469-473.
[2] PENG Dong-yang, WANG Rui, HU Gu-yu, ZU Jia-chen, WANG Tian-feng. Fair Joint Optimization of QoE and Energy Efficiency in Caching Strategy for Videos [J]. Computer Science, 2022, 49(4): 312-320.
[3] JIANG Rui, YIN Hui, XU You-yun. Millimeter-wave Beamforming Scheme Based on Location Fairness Guarantee for HSR Communications [J]. Computer Science, 2020, 47(10): 269-274.
[4] GUO Li-juan, LV Xiao-lin. Optimistic Certified Email for Line Topology [J]. Computer Science, 2018, 45(8): 156-159.
[5] WANG Zhen-chao,ZHAO Yun,XUE Wen-ling. Power Control Based on Fairness in D2DUnderlaid Cellular Networks [J]. Computer Science, 2018, 45(7): 104-109.
[6] LU Zheng-fu, PU Yan-hong, NI Sheng-bin, XU Chen-ming, YANG Chun-yao. Design and Simulation of Fair Data Exchange Protocol with Bounded Rationality [J]. Computer Science, 2018, 45(11): 115-123.
[7] GUO Zi-rong, ZENG Hua-xin and DOU Jun. Simple and Smoothed Fair Round Robin Scheduling Algorithm [J]. Computer Science, 2016, 43(1): 122-127.
[8] LIU Hai, PENG Chang-gen, ZHANG Hong and REN Zhi-jing. Game Logic Formal Model of Rational Secure Protocol [J]. Computer Science, 2015, 42(9): 118-126.
[9] SHI Zhou-qi,DING Zhi-jun and CHEN Hong-zhong. Further Study of Relationship between Weak Fairness and Fairness of Petri Nets [J]. Computer Science, 2014, 41(7): 49-51.
[10] SUN Yue,YU Jiong and ZHU Jian-bo. Preemptive Scheduling for Multiple DAGs in Cloud Computing [J]. Computer Science, 2014, 41(3): 145-148.
[11] GUO Jun-xia,GAO Cheng,XU Nan-shan and LU Gang. User Behavior Analysis Based on Web Browsing Logs [J]. Computer Science, 2014, 41(3): 110-115.
[12] FENG Yun-zhi and ZHANG En. Millionaires’ Protocol Based on Game Theory [J]. Computer Science, 2014, 41(12): 129-132.
[13] LIU Gui-kai and GAO Lei. RQRR:A New Fair and Efficient Packet Scheduling Algorithm [J]. Computer Science, 2013, 40(8): 72-78.
[14] LIU Jian-hui,WANG Jun,JI Chang-peng and WANG Yang. Balanced Algorithm to Suppress Free-riding in P2P Network [J]. Computer Science, 2013, 40(7): 36-39.
[15] LUO Qing-yun,CHEN Min and ZHAO Jin-guo. Cooperative Channel Allocation Strategy Based on Balancing Algorithm [J]. Computer Science, 2013, 40(4): 96-101.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!