Formal analysis and design of multi-party fair exchange protocols

被引:0
|
作者
Sihan Qing
Gaicheng Li
机构
[1] Chinese Academy of Sciences,Engineering Research Center for Information Security Technology, Institute of Software
[2] Beijing Zhongke Ansheng Corporation of Information Technology,undefined
[3] Graduate School of the Chinese Academy of Sciences,undefined
关键词
fair exchange; logical protocol; formal model; security requirement;
D O I
暂无
中图分类号
学科分类号
摘要
Based on the origin of message items and channel combination between transacting parties, and events and relations among events, this paper presents a concise, precise, and hierarchical model for general fair exchange protocols, formally specifies various security requirements which are able to reflect inherent requirements for fair exchange protocols more rigorously, and partition these security requirements with fine granularity. This work helps analyze, debug, and design multi-party fair exchange protocols more effectively and elaborately.
引用
收藏
页码:155 / 174
页数:19
相关论文
共 50 条
  • [31] Adaptive Security of Multi-party Protocols, Revisited
    Hirt, Martin
    Liu-Zhang, Chen-Da
    Maurer, Ueli
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 686 - 716
  • [32] Multi-Party Protocols, Information Complexity and Privacy
    Kerenidis, Iordanis
    Rosen, Adi
    Urrutia, Florent
    [J]. ACM TRANSACTIONS ON COMPUTATION THEORY, 2019, 11 (02)
  • [33] On the Efficiency of Multi-party Contract Signing Protocols
    Draper-Gil, Gerard
    Ferrer-Gomila, Josep-Lluis
    Francisca Hinarejos, M.
    Zhou, Jianying
    [J]. INFORMATION SECURITY, ISC 2015, 2015, 9290 : 227 - 243
  • [34] Quantum protocols for secure multi-party summation
    ZhaoXu Ji
    HuanGuo Zhang
    HouZhen Wang
    FuSheng Wu
    JianWei Jia
    WanQing Wu
    [J]. Quantum Information Processing, 2019, 18
  • [35] A multi-party rational exchange protocol
    Alcaide, Almudena
    Estevez-Tapiador, Juan M.
    Hernandez-Castro, Julio C.
    Ribagorda, Arturo
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: OTM 2007 WORKSHOPS, PT 1, PROCEEDINGS, 2007, 4805 : 42 - +
  • [36] Configurable security protocols for multi-party data analysis with malicious participants
    Malin, B
    Airoldi, E
    Edoho-Eket, S
    Li, YH
    [J]. ICDE 2005: 21ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2005, : 533 - 544
  • [37] Formal Analysis and Improvement of Multi-party Non-repudiation Protocol
    Wang, Xueming
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4120 - 4123
  • [38] Fair and Secure Multi-Party Computation with Cheater Detection
    Seo, Minhye
    [J]. CRYPTOGRAPHY, 2021, 5 (03)
  • [39] Batch Logical Protocols for Efficient Multi-Party Computation
    Kiribuchi, Naoto
    Kato, Ryo
    Endo, Tsukasa
    Nishide, Takashi
    Yoshiura, Hiroshi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (10) : 1718 - 1728
  • [40] SafeRegions: Performance evaluation of multi-party protocols on HBase
    Pontes, Rogerio
    Maia, Francisco
    Paulo, Joao
    Vilaca, Ricardo
    [J]. 2016 IEEE 35TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS WORKSHOPS (SRDSW), 2016, : 31 - 36