A sound logic for analysing electronic commerce protocols

  • Volker Kessler
  • Heike Neumann
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1485)


We present an authentication logic which is capable to analyse one of the most important features of electronic commerce protocols, i.e., the accountability of transactions. By referring to a formal semantics we prove that the calculus is correct. We apply our logic to the payment systems SET and Payword. The formal analysis explains why micropayment systems based on chains of hashvalues do not lead to the same level of assurance as usual payment systems.


Electronic commerce formal analysis logic of authentication micropayment Payword semantics SET 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    N. Asokan, E. Van Heereweghen, M. Steiner, Towards A Framework for Handling Disputes in Payment Systems, IBM Research Report RZ 2996 (#93042) 03/09/1998, IBM Research Division, Zurich.Google Scholar
  2. 2.
    M. Abadi, M. Tuttle, “A Semantics for a Logic of Authentication,” Proc. of the ACM Symp. of Principles of Distributed Computing, 1991, 201–216.Google Scholar
  3. 3.
    A. Bleeker, L. Meertens, “A Semantics for BAN-logic,” Proc. of the DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997.Google Scholar
  4. 4.
    M. Burrows, M. Abadi, R. Needham, A Logic of Authentication, Report 39 Digital Systems Research Center, Pao Alto, California, 1989.Google Scholar
  5. 5.
    D. Bolignano, “Towards the Formal Verification of Electronic Commerce Protocols,” Proc. of the 10th Computer Security Foundations Workshop, Rockport, IEEE Computer Society Press 1997, 133–146.Google Scholar
  6. 6.
    B. Chellas, Modal Logic, Cambridge University Press, Cambridge, England, 1980.Google Scholar
  7. 7.
    R.A. DeMillo, R.J. Lipton, and A.J. Perlis, “Social Processes and Proofs of Theorems and Programs,” Comm. ACM, vol. 22, no. 5, 1979.Google Scholar
  8. 8.
    R. Fagin, J. Halpern, Y. Moses, M. Vardi, Reasoning About Knowledge, MIT Press, Cambridge, Mass., 1995.Google Scholar
  9. 9.
    A. Huima, T. Aura, “Using a Multimodal Logic Express Conflicting Interests in Security Protocols,” Proc. of the DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997.Google Scholar
  10. 10.
    R. Kailar, “Accountability in Electronic Commerce Protocols,” IEEE Trans. on Software Engineering, Vol. 22, No. 5, 1996, 313–328.CrossRefGoogle Scholar
  11. 11.
    MasterCard and VISA Corporations, Secure Electronic Transaction (SET), http://www.mastercard.com/set and http://www.visa.com/Google Scholar
  12. 12.
    C. Meadows, P. Syverson, “A Formal Specification of Requirements for Payment Transactions in the SET Protocol,” Preproceedings of Financial Cryptography, 1998.Google Scholar
  13. 13.
    T. Pedersen, “Electronic Payments of Small Amounts,” Proc. Security Protocols 1996, Springer LNCS 1189, 59–68.Google Scholar
  14. 14.
    B. Pfitzmann, M. Waidner, Properties of Payment Systems: General Definition Sketch and Classification, IBM Research Report RZ 2823 (#90126) 05/06/1996, IBM Research Division, Zurich.Google Scholar
  15. 15.
    R. Rivest, A. Shamir, “Payword and Micromint: Two simple micropayment protocols,” Proc. Security Protocols 1996, Springer LNCS 1189, 69–88.Google Scholar
  16. 16.
    S. Stubblebine, R. Wright, “An Authentication Logic Supporting Synchronization, Revocation, and Receny,” Proc. Third ACM Conference on Computer and Communiations Security, New Delhi, 1996, 95–105.Google Scholar
  17. 17.
    P. Syverson, P. van Oorschot, “On Unifying Some Cryptographic Protocol Logics,” Proc. of the IEEE Computer Society Symp. on Security and Privacy 1994, 14–28.Google Scholar
  18. 18.
    G. Wedel, Formale Semantik für Authentifikationslogiken, Diplomarbeit FB Mathematik der RWTH Aachen, Nov. 1995.Google Scholar
  19. 19.
    G. Wedel, V. Kessler, “Formal Semantics for Authentication Logics,” Computer Security — ESORICS 96, Rome, Springer LNCS 1146, 1996, 219–241.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Volker Kessler
    • 1
  • Heike Neumann
    • 2
  1. 1.Corporate TechnologySiemens AGMunich
  2. 2.Mathematisches InstitutUniversity of Gie\enGie\en

Personalised recommendations