An Intensive Survey of Fair Non-repudiation Protocols
Steve Kremer, Olivier Markowitch, and Jianying Zhou. An Intensive Survey of Fair Non-repudiation Protocols. Computer Communications, 25(17):1606–1621, Elsevier Science Publishers, November 2002.
Download
Abstract
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Non-repudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having participated in a part or the whole of this communication. Therefore a non-repudiation protocol has to generate non-repudiation of origin evidences intended to Bob, and non-repudiation of receipt evidences destined to Alice. In this paper, we clearly define the properties a non-repudiation protocol must respect, and give a survey of the most important non-repudiation protocols. We describe protocols without and with trusted third party (TTP). For the later ones we discuss the evolution of the TTP's involvement and, between others, describe the most recent protocol using a transparent TTP. We also discuss some ad-hoc problems related to the management of non-repudiation evidences and shortly overview several efforts to formally verify these protocols.
BibTeX
@article{KremerMarkowitchZhou2002,
abstract = {With the phenomenal growth of the Internet and open
networks in general, security services, such as
non-repudiation, become crucial to many applications.
Non-repudiation services must ensure that when Alice
sends some information to Bob over a network, neither
Alice nor Bob can deny having participated in a part
or the whole of this communication. Therefore a
non-repudiation protocol has to generate
non-repudiation of origin evidences intended to Bob,
and non-repudiation of receipt evidences destined to
Alice. In this paper, we clearly define the
properties a non-repudiation protocol must respect,
and give a survey of the most important
non-repudiation protocols. We describe protocols
without and with trusted third party (TTP). For the
later ones we discuss the evolution of the TTP's
involvement and, between others, describe the most
recent protocol using a transparent TTP. We also
discuss some ad-hoc problems related to the
management of non-repudiation evidences and shortly
overview several efforts to formally verify these
protocols.},
author = {Kremer, Steve and Markowitch, Olivier and
Zhou, Jianying},
journal = {Computer Communications},
month = nov,
number = {17},
pages = {1606-1621},
publisher = {Elsevier Science Publishers},
title = {An Intensive Survey of Fair Non-repudiation
Protocols},
volume = {25},
year = {2002},
nmonth = {11},
url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/comcom02.pdf},
}