共查询到16条相似文献,搜索用时 46 毫秒
1.
提出用一种新的基于博弈逻辑ATL(Ahernating-time Temporal Logic)的电子支付协议建模与分析方法。新方法克服了传统时序逻辑把协议看成封闭系统进行分析的缺点.可以成功地对电子商务中的对抗与合作行为进行描述.利用新方法对Bolignano协议进行了严格的形式化分析.发现该协议不能满足公平性要求. 相似文献
2.
通用可组合安全的WLAN Mesh网络可信接入认证协议 总被引:1,自引:0,他引:1
现有的WLAN Mesh网络接入协议和可信网络接入协议在性能和安全性方面不能很好的满足WLAN Mesh网络可信接入的要求.针对这一情况,提出了一种高效的可证明安全的WLAN Mesh网络可信接入协议MN-TAP,该协议仅需4轮交互就能实现访问请求者,策略执行点和策略决策点三者之间的用户认证和密钥确认,同时在第一轮交互中就实现了策略决策点对访问请求者平台身份的认证和平台完整性的校验,提高了协议执行的效率,降低了服务器端的负载.利用通用可组合安全模型对新协议进行了安全性证明,并对协议性能进行了对比分析.结果表明:新协议达到通用可组合安全,且与现有协议相比性能优势明显. 相似文献
3.
4.
对一种电子支付协议的改进 总被引:1,自引:0,他引:1
随着电子商务在全球的迅猛发展,电子商务的安全问题日益受到人们的关注。安全的电子商务协议是确保电子商务活动可靠开展的基础,其中不可否认性和公平性则是电子商务协议的两个重要安全需求。介绍了Bolignano电子支付协议,对其不可否认性和公平性进行了分析,发现了协议在公平性方面存在不足,并通过引入ftp传送的思想,对协议进行了改进。最后本文通过严格的协议形式化分析,证明了改进后的协议满足不可否认性和公平性。 相似文献
5.
公平的移动小额支付协议 总被引:1,自引:0,他引:1
为了实现具有完全公平性和非单元支付功能的小额支付协议,该文首先提出了双PayWord链(DPWC)的概念和非单元支付的实现机制。利用DPWC,并基于数据业务管理平台(DSMP)提出了一种新的公平的移动小额支付协议(FMMP)。该协议由注册、支付、仲裁、结算和注销5个子协议组成。分析结果表明,该协议能提供支付的完全公平性和非单元支付功能,并且具有安全、高效和不可否认的特点。 相似文献
6.
基于PayWord的小额电子支付协议 总被引:15,自引:0,他引:15
本文基于R.Rivest和A.Shamir提出的小额电子支付协议PayWord,为因特网上低价位信息商品的交换设计了一种小额电子支付协议NMP.与现有的小额电子支付协议相比,NMP协议可以支持更多种类信息商品的交易,而且具有更好的安全性、公平和不可否认性。NMP协议仅仅增加了尽可能少的、必须的密码运算和消息,因而仍保持了很高的运行效率。 相似文献
7.
8.
9.
10.
11.
Canetti and Herzog have already proposed universally composable symbolic analysis (UCSA) to analyze mutual authentication and key exchange protocols. However, they do not analyze group key exchange protocol. Therefore, this paper explores an approach to analyze group key exchange protocols, which realize automation and guarantee the soundness of cryptography. Considered that there exist many kinds of group key exchange protocols and the participants’ number of each protocol is arbitrary. So this paper takes the case of Burmester-Desmedt (BD) protocol with three participants against passive adversary (3-BD-Passive). In a nutshell, our works lay the root for analyzing group key exchange protocols automatically without sacrificing soundness of cryptography. 相似文献
12.
Within the framework of universal composability, an appropriate ideal functionality that captures the basic security requirements of three party password-based key exchange was defined. An efficient real-word three party password-based key exchange protocol was also proposed. This protocol securely realizes the ideal functionality with respect to static party corruption. Thus it provides security guarantees under arbitrary composition with other protocols. 相似文献
13.
介绍固网支付的概念和演进过程以及固网支付业务使用的协议,简要分析协议栈的物理层、数据链路层和消息层,提出了一种固网支付系统的系统结构。通过对固网支付平台和终端的分析,简要阐述系统结构和业务功能。最后对固网支付业务的前景进行了展望,对业务发展中存在的一些问题进行了讨论。 相似文献
14.
The recently proposed universally composable security framework for analyzing security of cryptographic
protocols provides very strong security guarantees. In particular,
a protocol proven secure in this framework is guaranteed to
maintain its security even when run concurrently with arbitrary
other protocols. It has been shown that if a majority of the parties are
honest, then universally composable
protocols exist for essentially any cryptographic task
in the plain model (i.e., with no set-up assumptions beyond that of
authenticated communication).
When honest majority is not guaranteed, general feasibility results are
known only when given a trusted set-up, such as in the common reference string
model. Only little was known regarding the existence of
universally composable protocols in the plain model without
honest majority, and in particular regarding the
important special case of two-party protocols. We study the
feasibility of universally composable two-party function
evaluation in the plain model. Our results show that in this
setting, very few functions can be securely computed in the
framework of universal composability. We demonstrate this by
providing broad impossibility results that apply to large classes
of deterministic and probabilistic functions. For some of these
classes, we also present full characterizations of what can and
cannot be securely realized in the framework of universal
composability. Specifically, our characterizations are for the
classes of deterministic functions in which (a) both parties
receive the same output, (b) only one party receives output, and
(c) only one party has input. 相似文献
15.
理想功能是UC安全协议的基本单元和核心内容.在UC安全框架下协议设计的首要步骤就是要将协议所希望完成的功能抽象为一个"理想功能","理想功能"的合理定义不仅要从定义上保证安全,更重要的是要兼顾其可实现性.本文定义了基于身份的签名机制(IBS)在UC安全框架下对应的理想功能FIBS,证明了其可实现性以及UC安全的IBS与经典IBS安全定义EUF-CMIA安全之间的等价关系,保证了在构造复杂环境下UC安全协议的时候,EUF-CMIA安全的IBS可以作为一个模块被安全调用. 相似文献
16.
基于SSL与SET协议的电子商务支付系统 总被引:2,自引:0,他引:2
在线安全支付是保证电子商务发展的关键环节。目前电子交易中经常使用如下两种安全在线支付协议:安全套接层SSL协议和安全电子交易SET协议,文章在分析两种安全支付协议各自原理的基础上,对二者所能担任的安全服务以及实现机制作了详尽比较,并指出SET是未来的发展方向。 相似文献