An Intensive Survey of Fair Non-repudiation Protocols

Steve Kremer, Olivier Markowitch, and Jianying Zhou. An Intensive Survey of Fair Non-repudiation Protocols. Computer Communications, 25(17):1606–1621, Elsevier Science Publishers, November 2002.

Download

[PDF] 

Abstract

With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Non-repudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having participated in a part or the whole of this communication. Therefore a non-repudiation protocol has to generate non-repudiation of origin evidences intended to Bob, and non-repudiation of receipt evidences destined to Alice. In this paper, we clearly define the properties a non-repudiation protocol must respect, and give a survey of the most important non-repudiation protocols. We describe protocols without and with trusted third party (TTP). For the later ones we discuss the evolution of the TTP's involvement and, between others, describe the most recent protocol using a transparent TTP. We also discuss some ad-hoc problems related to the management of non-repudiation evidences and shortly overview several efforts to formally verify these protocols.

BibTeX

@article{KremerMarkowitchZhou2002,
  abstract =      {With the phenomenal growth of the Internet and open
                   networks in general, security services, such as
                   non-repudiation, become crucial to many applications.
                   Non-repudiation services must ensure that when Alice
                   sends some information to Bob over a network, neither
                   Alice nor Bob can deny having participated in a part
                   or the whole of this communication. Therefore a
                   non-repudiation protocol has to generate
                   non-repudiation of origin evidences intended to Bob,
                   and non-repudiation of receipt evidences destined to
                   Alice. In this paper, we clearly define the
                   properties a non-repudiation protocol must respect,
                   and give a survey of the most important
                   non-repudiation protocols. We describe protocols
                   without and with trusted third party (TTP). For the
                   later ones we discuss the evolution of the TTP's
                   involvement and, between others, describe the most
                   recent protocol using a transparent TTP. We also
                   discuss some ad-hoc problems related to the
                   management of non-repudiation evidences and shortly
                   overview several efforts to formally verify these
                   protocols.},
  author =        {Kremer, Steve and Markowitch, Olivier and
                   Zhou, Jianying},
  journal =       {Computer Communications},
  month =         nov,
  number =        {17},
  pages =         {1606-1621},
  publisher =     {Elsevier Science Publishers},
  title =         {An Intensive Survey of Fair Non-repudiation
                   Protocols},
  volume =        {25},
  year =          {2002},
  nmonth =        {11},
  url =           {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/comcom02.pdf},
}