Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach
Follow with the methodology of reverse engineering,an exploratory modeling and analysis of security of the typical Kremer-Markowitch multi-party non-repudiation protocol were carried out with a novel method named extended-CSP approach which had been proposed for two-party non-repudiation protocol in...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-11-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z2.026/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539844474404864 |
---|---|
author | Zhi-geng HAN Geng CHEN Jun-zhou LUO |
author_facet | Zhi-geng HAN Geng CHEN Jun-zhou LUO |
author_sort | Zhi-geng HAN |
collection | DOAJ |
description | Follow with the methodology of reverse engineering,an exploratory modeling and analysis of security of the typical Kremer-Markowitch multi-party non-repudiation protocol were carried out with a novel method named extended-CSP approach which had been proposed for two-party non-repudiation protocol in preliminary work.With the analysis,the inherent fact that this protocol statisfies not timeliness but non-repudiality and fairness was found successfully.The result of the analysis indicates that,as applying to two-party non-repudiation protocols,the extended-CSP approach can also be a new method for security verification of multi-repudiation protocols. |
format | Article |
id | doaj-art-dbdc67078cc14db3bda8621db4cc270a |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2012-11-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-dbdc67078cc14db3bda8621db4cc270a2025-01-14T06:34:31ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-11-013318919559670133Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approachZhi-geng HANGeng CHENJun-zhou LUOFollow with the methodology of reverse engineering,an exploratory modeling and analysis of security of the typical Kremer-Markowitch multi-party non-repudiation protocol were carried out with a novel method named extended-CSP approach which had been proposed for two-party non-repudiation protocol in preliminary work.With the analysis,the inherent fact that this protocol statisfies not timeliness but non-repudiality and fairness was found successfully.The result of the analysis indicates that,as applying to two-party non-repudiation protocols,the extended-CSP approach can also be a new method for security verification of multi-repudiation protocols.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z2.026/formal analysismulti-party non-repudiationtimelinessextended-CSP approach |
spellingShingle | Zhi-geng HAN Geng CHEN Jun-zhou LUO Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach Tongxin xuebao formal analysis multi-party non-repudiation timeliness extended-CSP approach |
title | Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach |
title_full | Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach |
title_fullStr | Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach |
title_full_unstemmed | Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach |
title_short | Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach |
title_sort | modeling and analysis of multi party non repudiation protocols with extended csp approach |
topic | formal analysis multi-party non-repudiation timeliness extended-CSP approach |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z2.026/ |
work_keys_str_mv | AT zhigenghan modelingandanalysisofmultipartynonrepudiationprotocolswithextendedcspapproach AT gengchen modelingandanalysisofmultipartynonrepudiationprotocolswithextendedcspapproach AT junzhouluo modelingandanalysisofmultipartynonrepudiationprotocolswithextendedcspapproach |