Skip to main content

A New Logic for Electronic Commerce Protocols

  • Conference paper
  • First Online:
Algebraic Methodology and Software Technology (AMAST 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1816))

Abstract

The primary objective of this paper is to present the definition of a new dynamic, linear and modal logic for security protocols. The logic is compact, expressive and formal. It allows the specification of classical security properties (authentication, secrecy and integrity) and also electronic commerce properties (non-repudiation, anonymity, good atomicity, money atomicity, certified delivery, etc.). The logic constructs are interpreted over a trace-based model. Traces reflect valid protocol executions in the presence of a malicious smart intruder. The logic is endowed with a tableau-based proof system that leads to a modular denotational semantics.

This research is supported by a research grant from the National and Science Engineering Council, NSERC, and the Fonds pour la formation de Chercheurs et l’Aide à la Recherche, FCAR.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Martin Abadi and Andrew D. Gordon. A Calculus for Cryptographic Protocols: The Spi Calculus. In Proceedings of the Fourth ACM Conference on Computer and Communications Security. ACM Press, April 1997.

    Google Scholar 

  2. P. Bieber. A Logic of Communication in a Hostile Environment. In Proceedings of the Computer Security Foundations Workshop III, pages 14–22. IEEE Computer Society Press, 1990.

    Google Scholar 

  3. Dominique Bolignano. An Approach to the Formal Verification of Cryptographic Protocols. In Proceedings of the Third ACM Conference on Computer and Communications Security, CCS’96, New Delhi, India, pages 106–118. ACM Press, 1996.

    Google Scholar 

  4. M. Burrows, M. Abadi, and R. Needham. A Logic of Authentication. In Proceedings of the Royal Society of London A Vol. 426, pages 233–271, 1989.

    Article  MATH  MathSciNet  Google Scholar 

  5. U. Carlsen. Formal Specification and Analysis of Cryptographic Protocols. PhD thesis, Thèse d’Informatique soutenue à l’Université PARIS XI, October 1994.

    Google Scholar 

  6. C. A. R. Hoare. Communicating Sequential Processes. Prentice Hall, 1985.

    Google Scholar 

  7. V. Shmatikov J. C. Mitchell and U. Stern. Finite-state analysis of SSL 3.0. In Proceedings of the 7th USENIX Security Symposium (SECURITY-98), pages 201–216, Berkeley, January 26–29, 1998. Usenix Association.

    Google Scholar 

  8. R. A. Kemmerer. Using Formal Verification Techniques to Analyze Encryption Protocols. In Proceedings of the 1987 IEEE Symposium on Research in Security and Privacy, pages 134–139. IEEE Computer Society Press, 1987.

    Google Scholar 

  9. Gavin Lowe. An Attack on the Needham-Schroeder Public Key Authentication Protocol. Information Processing Letters, 56(3):131–136, November 1995.

    Article  MATH  Google Scholar 

  10. Gavin Lowe. Some New Attacks upon Security Protocols. In Proceedings of the Computer Security Foundations Workshop VIII. IEEE Computer Society Press, 1996.

    Google Scholar 

  11. Einar Snekkenes. Authentication in Open Systems. In 10th IFIP WG 6.1 Symposium on Protocol Specification, Testing and Verification, pages 313–324, June 1990.

    Google Scholar 

  12. Einar Snekkenes. Formal Specification and Analysis of Cryptographic Protocols. PhD thesis, Faculty of Mathematics and Natural Sciences, University of Oslo, Norwegian Defence Research Establishment, P.O. Box 25, N-2007, Kjeller, Norway, January 1995.

    Google Scholar 

  13. The commission of the European Communities CEC DG-XIII. Security Investigation Final Report. Technical Report S2011/7000/D010 7000 1000, CEC, September 1993.

    Google Scholar 

  14. Vijay Varadharajan. Verification of Network Security Protocols. Computers and Security, 8, December 1989.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Adi, K., Debbabi, M., Mejri, M. (2000). A New Logic for Electronic Commerce Protocols. In: Rus, T. (eds) Algebraic Methodology and Software Technology. AMAST 2000. Lecture Notes in Computer Science, vol 1816. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45499-3_35

Download citation

  • DOI: https://doi.org/10.1007/3-540-45499-3_35

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67530-3

  • Online ISBN: 978-3-540-45499-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics