Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach

Follow with the methodology of reverse engineering,an exploratory modeling and analysis of security of the typical Kremer-Markowitch multi-party non-repudiation protocol were carried out with a novel method named extended-CSP approach which had been proposed for two-party non-repudiation protocol in...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhi-geng HAN, Geng CHEN, Jun-zhou LUO
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2012-11-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z2.026/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539844474404864
author Zhi-geng HAN
Geng CHEN
Jun-zhou LUO
author_facet Zhi-geng HAN
Geng CHEN
Jun-zhou LUO
author_sort Zhi-geng HAN
collection DOAJ
description Follow with the methodology of reverse engineering,an exploratory modeling and analysis of security of the typical Kremer-Markowitch multi-party non-repudiation protocol were carried out with a novel method named extended-CSP approach which had been proposed for two-party non-repudiation protocol in preliminary work.With the analysis,the inherent fact that this protocol statisfies not timeliness but non-repudiality and fairness was found successfully.The result of the analysis indicates that,as applying to two-party non-repudiation protocols,the extended-CSP approach can also be a new method for security verification of multi-repudiation protocols.
format Article
id doaj-art-dbdc67078cc14db3bda8621db4cc270a
institution Kabale University
issn 1000-436X
language zho
publishDate 2012-11-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-dbdc67078cc14db3bda8621db4cc270a2025-01-14T06:34:31ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-11-013318919559670133Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approachZhi-geng HANGeng CHENJun-zhou LUOFollow with the methodology of reverse engineering,an exploratory modeling and analysis of security of the typical Kremer-Markowitch multi-party non-repudiation protocol were carried out with a novel method named extended-CSP approach which had been proposed for two-party non-repudiation protocol in preliminary work.With the analysis,the inherent fact that this protocol statisfies not timeliness but non-repudiality and fairness was found successfully.The result of the analysis indicates that,as applying to two-party non-repudiation protocols,the extended-CSP approach can also be a new method for security verification of multi-repudiation protocols.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z2.026/formal analysismulti-party non-repudiationtimelinessextended-CSP approach
spellingShingle Zhi-geng HAN
Geng CHEN
Jun-zhou LUO
Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach
Tongxin xuebao
formal analysis
multi-party non-repudiation
timeliness
extended-CSP approach
title Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach
title_full Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach
title_fullStr Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach
title_full_unstemmed Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach
title_short Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach
title_sort modeling and analysis of multi party non repudiation protocols with extended csp approach
topic formal analysis
multi-party non-repudiation
timeliness
extended-CSP approach
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z2.026/
work_keys_str_mv AT zhigenghan modelingandanalysisofmultipartynonrepudiationprotocolswithextendedcspapproach
AT gengchen modelingandanalysisofmultipartynonrepudiationprotocolswithextendedcspapproach
AT junzhouluo modelingandanalysisofmultipartynonrepudiationprotocolswithextendedcspapproach