Secrecy analysis of purchase transaction in electronic purses

Il Gon Kim, Hyun Seok Kim, Ji Yeon Lee, Inhye Kang, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The Common Electronic Purse Specifications (CEPS) was created as a globally interoperable electronic purse standard. However, it is also well known that numerous significant errors have been found in the design of e-commerce protocols. In this paper model-based verification using Casper, CSP and FDR is addressed, demonstrating how the secrecy properties in the CEPS can be achieved. Vulnerabilities are confirmed and its countermeasure are mentioned. In addition, we confirmed that model-based verification techniques should help identify and analyze error in the design of ecommerce protocols.

Original languageEnglish
Title of host publicationProceedings - International Conference on Advanced Information Networking and Applications, AINA
Pages979-984
Number of pages6
Volume1
DOIs
Publication statusPublished - 2006 Nov 22
Event20th International Conference on Advanced Information Networking and Applications - Vienna, Austria
Duration: 2006 Apr 182006 Apr 20

Other

Other20th International Conference on Advanced Information Networking and Applications
CountryAustria
CityVienna
Period06/4/1806/4/20

Fingerprint

Specifications
Network protocols

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Kim, I. G., Kim, H. S., Lee, J. Y., Kang, I., & Choi, J. Y. (2006). Secrecy analysis of purchase transaction in electronic purses. In Proceedings - International Conference on Advanced Information Networking and Applications, AINA (Vol. 1, pp. 979-984). [1620313] https://doi.org/10.1109/AINA.2006.296

Secrecy analysis of purchase transaction in electronic purses. / Kim, Il Gon; Kim, Hyun Seok; Lee, Ji Yeon; Kang, Inhye; Choi, Jin Young.

Proceedings - International Conference on Advanced Information Networking and Applications, AINA. Vol. 1 2006. p. 979-984 1620313.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, IG, Kim, HS, Lee, JY, Kang, I & Choi, JY 2006, Secrecy analysis of purchase transaction in electronic purses. in Proceedings - International Conference on Advanced Information Networking and Applications, AINA. vol. 1, 1620313, pp. 979-984, 20th International Conference on Advanced Information Networking and Applications, Vienna, Austria, 06/4/18. https://doi.org/10.1109/AINA.2006.296
Kim IG, Kim HS, Lee JY, Kang I, Choi JY. Secrecy analysis of purchase transaction in electronic purses. In Proceedings - International Conference on Advanced Information Networking and Applications, AINA. Vol. 1. 2006. p. 979-984. 1620313 https://doi.org/10.1109/AINA.2006.296
Kim, Il Gon ; Kim, Hyun Seok ; Lee, Ji Yeon ; Kang, Inhye ; Choi, Jin Young. / Secrecy analysis of purchase transaction in electronic purses. Proceedings - International Conference on Advanced Information Networking and Applications, AINA. Vol. 1 2006. pp. 979-984
@inproceedings{55deb6b133a2447fb41d8d146b548d92,
title = "Secrecy analysis of purchase transaction in electronic purses",
abstract = "The Common Electronic Purse Specifications (CEPS) was created as a globally interoperable electronic purse standard. However, it is also well known that numerous significant errors have been found in the design of e-commerce protocols. In this paper model-based verification using Casper, CSP and FDR is addressed, demonstrating how the secrecy properties in the CEPS can be achieved. Vulnerabilities are confirmed and its countermeasure are mentioned. In addition, we confirmed that model-based verification techniques should help identify and analyze error in the design of ecommerce protocols.",
author = "Kim, {Il Gon} and Kim, {Hyun Seok} and Lee, {Ji Yeon} and Inhye Kang and Choi, {Jin Young}",
year = "2006",
month = "11",
day = "22",
doi = "10.1109/AINA.2006.296",
language = "English",
isbn = "0769524664",
volume = "1",
pages = "979--984",
booktitle = "Proceedings - International Conference on Advanced Information Networking and Applications, AINA",

}

TY - GEN

T1 - Secrecy analysis of purchase transaction in electronic purses

AU - Kim, Il Gon

AU - Kim, Hyun Seok

AU - Lee, Ji Yeon

AU - Kang, Inhye

AU - Choi, Jin Young

PY - 2006/11/22

Y1 - 2006/11/22

N2 - The Common Electronic Purse Specifications (CEPS) was created as a globally interoperable electronic purse standard. However, it is also well known that numerous significant errors have been found in the design of e-commerce protocols. In this paper model-based verification using Casper, CSP and FDR is addressed, demonstrating how the secrecy properties in the CEPS can be achieved. Vulnerabilities are confirmed and its countermeasure are mentioned. In addition, we confirmed that model-based verification techniques should help identify and analyze error in the design of ecommerce protocols.

AB - The Common Electronic Purse Specifications (CEPS) was created as a globally interoperable electronic purse standard. However, it is also well known that numerous significant errors have been found in the design of e-commerce protocols. In this paper model-based verification using Casper, CSP and FDR is addressed, demonstrating how the secrecy properties in the CEPS can be achieved. Vulnerabilities are confirmed and its countermeasure are mentioned. In addition, we confirmed that model-based verification techniques should help identify and analyze error in the design of ecommerce protocols.

UR - http://www.scopus.com/inward/record.url?scp=33751099865&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33751099865&partnerID=8YFLogxK

U2 - 10.1109/AINA.2006.296

DO - 10.1109/AINA.2006.296

M3 - Conference contribution

SN - 0769524664

SN - 9780769524665

VL - 1

SP - 979

EP - 984

BT - Proceedings - International Conference on Advanced Information Networking and Applications, AINA

ER -