Skip to main content

Formal Verification of the Horn-Preneel Micropayment Protocol

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2575))

Abstract

We have formally verified that the Horn-Preneel micropayment protocol possesses an important safety property. The property, called non-overcharge property in this paper, is that a payee cannot be credited amount more than what a payer intends to pay by the broker. The verification has been done by modeling the protocol as an observational transition system considering malicious principals, describing the model in CafeOBJ, writing proof scripts showing that the protocol possesses the property in CafeOBJ, and executing the proof scripts with the CafeOBJ system. We describe the modeling of the protocol and the verification in this paper.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Garay, J.A., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Herreweghen, E.V., Waidner, M.: Design, implementation and deployment of the iKP secure electronic payment system. IEEE Journal of Selected Areas in Communications 18 (2000) 611–627

    Article  Google Scholar 

  2. MasterCard/Visa: SET secure electronic transactions protocol. Book One: Business Specifications, Book Two: Technical Specification, Book Three: Formal Protocol Definition (http://www.setco.org/set specifications.html) (1997)

  3. Micali, S., Rivest, R.L.: Micropayments revisited. In: Progress in Cryptology-CT-RSA 2002. LNCS 2271, Springer (2002) 149–163

    Chapter  Google Scholar 

  4. Horn, G., Preneel, B.: Authentication and payment in future mobile systems. In: Computer Security-ESORICS 98. LNCS 1485, Springer-Verlag (1998) 277–293

    Chapter  Google Scholar 

  5. Hauser, R., Steiner, M., Waidner, M.: Micro-payments based on iKP. In: 14th Worldwide Congress on Computer and Communications Security Protection. (1996) 67–82

    Google Scholar 

  6. Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56 (1995) 131–133

    Article  MATH  Google Scholar 

  7. CafeOBJ: CafeOBJ web page. http://www.ldl.jaist.ac.jp/cafeobj/ (2001)

  8. Diaconescu, R., Futatsugi, K.: CafeOBJ report. AMAST Series in Computing, 6. World Scientific, Singapore (1998)

    Google Scholar 

  9. Ogata, K., Futatsugi, K.: Rewriting-based verification of authentication protocols. In: WRLA’ 02. Volume 71 of ENTCS., Elsevier Science Publishers (2002)

    Google Scholar 

  10. Goguen, J., Malcolm, G.: A hidden agenda. Theor. Comput. Sci. 245 (2000) 55–101

    Article  MATH  MathSciNet  Google Scholar 

  11. Chandy, K.M., Misra, J.: Parallel program design: a foundation. Addison-Wesley, Reading, MA (1988)

    MATH  Google Scholar 

  12. Pedersen, T.P.: Electronic payments of small amounts. In: Security Protocols. LNCS 1189, Springer-Verlag (1996) 59–68

    Google Scholar 

  13. Lamport, L.: Passward authentication with insecure communications. Comm. ACM 24 (1981) 770–772

    Article  Google Scholar 

  14. Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inform. Theory IT-29 (1983) 198–208

    Article  MathSciNet  Google Scholar 

  15. Paulson, L.C.: The inductive approach to verifying cryptographic protocols. J. Comput. Security 6 (1998) 85–128

    Google Scholar 

  16. Schneider, S.: Verifying authentication protocols in CSP. IEEE Trans. Softw. Eng. 24 (1998) 741–758

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ogata, K., Futatsugi, K. (2003). Formal Verification of the Horn-Preneel Micropayment Protocol. In: Zuck, L.D., Attie, P.C., Cortesi, A., Mukhopadhyay, S. (eds) Verification, Model Checking, and Abstract Interpretation. VMCAI 2003. Lecture Notes in Computer Science, vol 2575. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36384-X_20

Download citation

  • DOI: https://doi.org/10.1007/3-540-36384-X_20

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00348-9

  • Online ISBN: 978-3-540-36384-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics