Formal Verification of e-Auction Protocols

被引:0
|
作者
Dreier, Jannik [1 ]
Lafourcade, Pascal [1 ]
Lakhnech, Yassine [1 ]
机构
[1] Univ Grenoble 1, CNRS, Verimag, France
关键词
DESIGN;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Auctions have a long history, having been recorded as early as 500 B.C.. With the rise of Internet, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions. We propose a formal framework to analyze and verify security properties of e-Auction protocols. We model protocols in the Applied p-Calculus and define privacy notions, which include secrecy of bids, anonymity of the participants, receipt-freeness and coercion-resistance. We also discuss fairness, non-repudiation and non-cancellation. Additionally we show on two case studies how these properties can be verified automatically using ProVerif, and discover several attacks.
引用
收藏
页码:247 / 266
页数:20
相关论文
共 50 条
  • [1] Batch verification of validity of bids in homomorphic e-auction
    Peng, Kun
    Boyd, Colin
    Dawson, Ed
    [J]. COMPUTER COMMUNICATIONS, 2006, 29 (15) : 2798 - 2805
  • [2] Theoritical Model for e-Auction
    Khan, Hameed Ullah
    Al-Faifi, Abdullah M.
    Diab, Diab Mahmoud
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (04): : 116 - 120
  • [3] Efficiency Improvement of Homomorphic E-Auction
    Peng, Kun
    Bao, Feng
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 238 - 249
  • [4] Secure Cryptographic E-Auction System
    Heng, Swee-Huay
    Tan, Soo -Chin
    [J]. INTERNATIONAL JOURNAL OF TECHNOLOGY, 2022, 13 (06) : 1222 - 1230
  • [5] KLEPTOGRAPHIC ATTAKS ON E-AUCTION SCHEMES
    Gogolewski, Marcin
    Gomulkiewicz, Marcin
    Grzaslewicz, Jaroslaw
    Kubiak, Przemyslaw
    Kutylowski, Miroslaw
    Lauks, Anna
    [J]. TATRACRYPT '07 - 7TH CENTRAL EUROPE CONFERENCE OF CRYPTOLOGY, 2008, 41 : 47 - +
  • [6] A Longitudinal Study on e-Auction Adoption
    Fang, Kwoting
    Tu, Chien-Chung
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 9581 - 9584
  • [7] Formal Verification of e-Reputation Protocols
    Kassem, Ali
    Lafourcade, Pascal
    Lakhnech, Yassine
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 247 - 261
  • [8] Customers' perception on attitude towards e-auction
    Tu, Chien-Chung
    Lin, Chwen-Yea
    Fang, Kwoting
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1044 - 1048
  • [9] E-auction web assessment model in China
    Lu, June
    Wang, Lu-Zhuang
    Yu, Chun-Sheng
    Wu, Jia-Ying
    [J]. ELECTRONIC COMMERCE RESEARCH, 2009, 9 (03) : 149 - 172
  • [10] Modeling the Trust with ECT in E-Auction Loyalty
    Lin, Chwen-Yea
    Tu, Chien-Chung
    Fang, Kwoting
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 851 - 855