Title of article :
Verifying the SET registration protocols
Author/Authors :
G.، Bella, نويسنده , , F.، Massacci, نويسنده , , L.C.، Paulson, نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2003
Pages :
-76
From page :
77
To page :
0
Abstract :
Secure electronic transaction (SET) is an immense e-commerce protocol designed to improve the security of credit card purchases. In this paper, we focus on the initial bootstrapping phases of SET, whose objective is the registration of cardholders and merchants with a SET certificate authority. The aim of registration is twofold: getting the approval of the cardholderʹs or merchantʹs bank and replacing traditional credit card numbers with electronic credentials that cardholders can present to the merchant so that their privacy is protected. These registration subprotocols present a number of challenges to current formal verification methods. First, they do not assume that each agent knows the public keys of the other agents. Key distribution is one of the protocolsʹ tasks. Second, SET uses complex encryption primitives (digital envelopes) which introduce dependency chains: the loss of one secret key can lead to potentially unlimited losses. Building upon our previous work, we have been able to model and formally verify SETs registration with the inductive method in Isabelle/HOL (T. Nipkow et al., 2002). We have solved its challenges with very general techniques.
Journal title :
IEEE Journal on Selected Areas in Communications
Serial Year :
2003
Journal title :
IEEE Journal on Selected Areas in Communications
Record number :
60862
Link To Document :
بازگشت