Skip to main content

A formal specification of requirements for payment transactions in the SET protocol

  • Conference paper
  • First Online:
Financial Cryptography (FC 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1465))

Included in the following conference series:

Abstract

Payment transactions in the SET (Secure Electronic Transaction) protocol are described. Requirements for SET are discussed and formally represented in a version of NPATRL (the NRL Protocol Analyzer Temporal Requirements Language). NPATRL is language for expressing generic requirements, heretofore applied to key distribution or key agreement protocols. Transaction vectors and other new constructs added to NPATRL for reasoning about SET payment transactions are described along with properties of their representation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Burrows, M. Abadi, and R. Needham, A Logic of Authentication, SRC Research Report 39, Digital Systems Research Center, February 1989.

    Google Scholar 

  2. D. Bolignano, “Towards the Formal Verification of Electronic Commerce Protocols”, Proceedings of the 10 th IEEE Computer Security Foundations Workshop, pp. 133–146, Rockport Massachusetts, IEEE CS Press, June 1997.

    Google Scholar 

  3. S. Brackin, “Automatic Formal Analyses of Two Large Commercial Protocols”, DIM ACS Workshop on Design and Formal Verification of Security Protocols, Rutgers New Jersey, September 1997. (Paper available at http://dimacs.rutgers.edu/Workshops/Security/program2/brackin.html)

    Google Scholar 

  4. L. Gong, R. Needham, and R. Yahalom, “Reasoning about Belief in Cryptographic Protocols”, Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 234–248, IEEE Computer Society Press, Oakland California, May 1990.

    Google Scholar 

  5. SET Secure Electronic Transaction Specification, Version 1.0, May 1997. (Downloaded from http://www.visa.com/set/)

    Google Scholar 

  6. P. Syverson and C. Meadows, “A Logical Language for Specifying Cryptographic Protocol Requirements”, Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 165–177, IEEE Computer Society Press, Oakland California, May 1993.

    Google Scholar 

  7. P. Syverson and C. Meadows, “Formal Requirements for Key Distribution Protocols”, Advances in Cryptology — EUROCRYPT '94, LNCS vol. 950, A. De Santis, ed., pp. 320–331, Springer-Verlag, Perugia Italy, 1994.

    Google Scholar 

  8. P. Syverson and C. Meadows, “A Formal Language for Cryptographic Protocol Requirements”, Designs, Codes, and Cryptography, vol. 7, nos. 1 and 2, pp. 27–59, January 1996.

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Rafael Hirchfeld

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Meadows, C., Syverson, P. (1998). A formal specification of requirements for payment transactions in the SET protocol. In: Hirchfeld, R. (eds) Financial Cryptography. FC 1998. Lecture Notes in Computer Science, vol 1465. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055477

Download citation

  • DOI: https://doi.org/10.1007/BFb0055477

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64951-9

  • Online ISBN: 978-3-540-53918-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics