An Intensive Survey of Fair Non-repudiation Protocols
Steve Kremer, Olivier Markowitch, and Jianying Zhou. An Intensive Survey of Fair Non-repudiation Protocols. Computer Communications, 25(17):1606–1621, Elsevier Science Publishers, November 2002.
Download
Abstract
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Non-repudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having participated in a part or the whole of this communication. Therefore a non-repudiation protocol has to generate non-repudiation of origin evidences intended to Bob, and non-repudiation of receipt evidences destined to Alice. In this paper, we clearly define the properties a non-repudiation protocol must respect, and give a survey of the most important non-repudiation protocols. We describe protocols without and with trusted third party (TTP). For the later ones we discuss the evolution of the TTP's involvement and, between others, describe the most recent protocol using a transparent TTP. We also discuss some ad-hoc problems related to the management of non-repudiation evidences and shortly overview several efforts to formally verify these protocols.
BibTeX
@article{KremerMarkowitchZhou2002, abstract = {With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Non-repudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having participated in a part or the whole of this communication. Therefore a non-repudiation protocol has to generate non-repudiation of origin evidences intended to Bob, and non-repudiation of receipt evidences destined to Alice. In this paper, we clearly define the properties a non-repudiation protocol must respect, and give a survey of the most important non-repudiation protocols. We describe protocols without and with trusted third party (TTP). For the later ones we discuss the evolution of the TTP's involvement and, between others, describe the most recent protocol using a transparent TTP. We also discuss some ad-hoc problems related to the management of non-repudiation evidences and shortly overview several efforts to formally verify these protocols.}, author = {Kremer, Steve and Markowitch, Olivier and Zhou, Jianying}, journal = {Computer Communications}, month = nov, number = {17}, pages = {1606-1621}, publisher = {Elsevier Science Publishers}, title = {An Intensive Survey of Fair Non-repudiation Protocols}, volume = {25}, year = {2002}, nmonth = {11}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/comcom02.pdf}, }