Sciweavers

Share
COMCOM
2002

An intensive survey of fair non-repudiation protocols

10 years 4 months ago
An intensive survey of fair non-repudiation protocols
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Nonrepudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having participated in a part or the whole of this communication. Therefore a fair non-repudiation protocol has to generate non-repudiation of origin evidences intended to Bob, and non-repudiation of receipt evidences destined to Alice. In this paper, we clearly define the properties a fair non-repudiation protocol must respect, and give a survey of the most important non-repudiation protocols without and with trusted third party (TTP). For the later ones we discuss the evolution of the TTP's involvement and, between others, describe the most recent protocol using a transparent TTP. We also discuss some ad-hoc problems related to the management of non-repudiation evidences. Key words: Network security,...
Steve Kremer, Olivier Markowitch, Jianying Zhou
Added 17 Dec 2010
Updated 17 Dec 2010
Type Journal
Year 2002
Where COMCOM
Authors Steve Kremer, Olivier Markowitch, Jianying Zhou
Comments (0)
books