The Verification Logic for Secure Transaction Protocols

In common sense, electronic transactions through secure transaction protocols are secure. However, not all so-called secure transaction protocols are secure. To verify [he protocols this paper proposes the A'DL (nonmonotonic dvnamic logic). .4 novel idea oj jail-negate, namelv non-monotonic, is proposed in :VDL. Thus some securi ZV properties are believed [0 he [rue if 11'e,based on current conditions, cannot prove they are false. On the other hand. the dynamic property in NDL converts the transaction into an action sequences. To evaluate the logic. 111'0 instances are illustrated. Front the evaluation, il is convinced that the NDL is effective and promising.

[1]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[2]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[3]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[4]  Li Gong Handling infeasible specifications of cryptographic protocols , 1991, Proceedings Computer Security Foundations Workshop IV.

[5]  Mark R. Tuttle,et al.  A Semantics for a Logic of Authentication , 1991, PODC 1991.

[6]  Giovanni Maria Sacco,et al.  Timestamps in key distribution protocols , 1981, CACM.

[7]  Stephen H. Brackin,et al.  A HOL extension of GNY for automatically analyzing cryptographic protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[8]  Catherine A. Meadows,et al.  A Formal Specification of Requirements for Payment Transactions in the SET Protocol , 1998, Financial Cryptography.

[9]  Catherine A. Meadows,et al.  The NRL Protocol Analyzer: An Overview , 1996, J. Log. Program..

[10]  Tad Hogg,et al.  Enhancing privacy and trust in electronic communities , 1999, EC '99.

[11]  Heike Neumann,et al.  A Sound Logic for Analysing Electronic Commerce Protocols , 1998, ESORICS.

[12]  Diomidis Spinellis,et al.  Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification , 1999, Comput. Commun..