Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder

@article{Klay2007AutomaticMF,
  title={Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder},
  author={Francis Klay and Laurent Vigneron},
  journal={ArXiv},
  year={2007},
  volume={abs/0710.3305}
}
Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary. Formal methods are clever and without error, therefore using them for verifying such protocols is crucial. In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol. After discussing the limitations of this method, we define a new one, based on the handling of the knowledge of… CONTINUE READING

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 12 CITATIONS

A Formal Method for Analyzing Fair Exchange Protocols

  • 2009 WASE International Conference on Information Engineering
  • 2009
VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties

  • Formal Aspects in Security and Trust
  • 2009
VIEW 2 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Pitfalls in Formal Reasoning about Security Protocols

  • 2010 International Conference on Availability, Reliability and Security
  • 2010

References

Publications referenced by this paper.
SHOWING 1-10 OF 30 REFERENCES

Security analysis of efficient (Un-) fair non-repudiation protocols

  • Formal Aspects of Computing
  • 2004
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Towards Verification of Timed Non-repudiation Protocols

  • Formal Aspects in Security and Trust
  • 2005
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

On the security of fair non-repudiation protocols

  • International Journal of Information Security
  • 2003
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Analysis of Abuse-Free Contract Signing

  • Financial Cryptography
  • 2000
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Formal Analysis of a Non-Repudiation Protocol

S. Schneider
  • In Proceedings of The 11th Computer Security Foundations Workshop,
  • 1998
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

LTL model checking for security protocols

  • Journal of Applied Non-Classical Logics
  • 2009
VIEW 1 EXCERPT