A formal model of fair exchange protocols

来源 :Science in China(Series F:Information Sciences) | 被引量 : 0次 | 上传用户:wzhjxl3
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Based on the study of existing fair exchange protocols, this paper sets up an accurate formal model by stepwise refinement. In the process of refinement an unreliable channel is employed to simulate an attack behavior. The model provides a novel formal definition of exchanged items, and presents the formal goals for fairness, accountability, etc., reflecting the inherent requirements for fair exchange protocols across-the-board. In order to check, prove, and design fair exchange protocols effectively and efficiently, the model puts forward a novel property of abuse-freeness which applies to all fair exchange protocols, gives a formal definition for trust strand of the third party, and presents general criteria of designing a secure and effective fair exchange protocol. Taking a typical fair exchange protocol as an example, this paper presents the analysis steps of fair exchange protocols appealing to our model. An unknown attack is uncovered. The analysis reveals the process of a complete attack, discovering deeper reasons for causing an attack. Finally, we modify the flawed protocol and the revised protocol ensures the desirable properties. Based on the study of existing fair exchange protocols, this paper sets up an accurate formal model by stepwise refinement. In the process of refinement an unreliable channel is employed to simulate an attack behavior. The model provides a novel formal definition of of items, and presents the formal goals for fairness, accountability, etc., reflecting the historic requirements for fair exchange protocols across-the-board. In order to check, prove, and design fair exchange protocols effectively and efficiently, the model puts forward a novel property of abuse-freeness which applies to all fair exchange protocols, gives a formal definition for trust strand of the third party, and presents general criteria of designing a secure and effective fair exchange protocol. Taking a typical fair exchange protocol as an example, this paper presents the analysis steps of fair exchange protocols appealing to our model. An unknown attack is uncovered. The analysis reveals the process of a compl Finally, we modify the flawed protocol and the revised protocol ensures the desirable properties.
其他文献
由于受全球金融危机的影响,世界进入经济增长缓慢的时期。世界银行在韩国首尔发布的“2009年全球金融发展”的报告中指出,由于投资的减少和出口下降,东欧和中亚国家经济基础
这里是多民族聚居的地方,这里是农耕文化和草原文化交融的地区,一代天骄成吉思汗长眠于此,忠诚坚贞的达尔扈特人驻守在此,这里是天骄圣地,这里是煤海绿洲,这里是神奇美丽的伊
1953年,G.Donney 和 J.D.H.Donney 根据氟碳铈矿(Bastnaesite)、氟碳钙铈矿(Parisite)、栾琴钙铈矿(Roentgenite)和新奇钙铈矿(synchisite)的化学成分中含 CeFCO_3和 CaCO_3
商业化的力量似乎在明确的利益驱使下改变和颠覆着中国电影的一切, 2005年,在几部贺岁大片登场的喧闹声中,划上了一个差强人意的句号。期望值落差和超女的海选吸引眼球的方法
磨削系最广泛地用作精加工工件的方法之一,通过这种加工方法,使被加工表面得到较高之精度及良好之光洁度。 本文内引述了在外圆磨削时测定决定表面光洁度之切削规范的几个试
请下载后查看,本文暂不支持在线获取查看简介。中国辞书的一座丰碑 Please download to view, this article does not support online access to view profile. A monument t
期刊
康滇地盾在过去一直被认为是一个較典型的地盾。但是仔細分析康滇地盾的地质史以后,觉得无論从沉积厚度、岩浆活动或构造变动中,均可看出康滇地盾的活动性在三迭紀以后有显
读小学四年级的孙女说:“昨天,我看了报上一篇报道,说某明星‘坐客常州电视台’。我们语文书上只有‘做客’,词典里也只有‘作 The granddaughter who was in the fourth gr
The concept of treatment of hypertension has gone through wide swings over the years.From ignoring blood pressure(BP)treatment initially,to aggressive BP contro
非洲进步小组日前发布了《新多边主义》的小册子,非洲进步小组主席、联合国前秘书长安南评价说,这些文章的普遍观点是,要让发展中国家特别是 Annan, the chairman of the Af