A randomized protocol for signing contracts
Communications of the ACM
Proceedings of CRYPTO 84 on Advances in cryptology
Non-repudiation with mandatory proof of receipt
ACM SIGCOMM Computer Communication Review
Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
Journal of Network and Computer Applications
On the efficient implementation of fair non-repudiation
ACM SIGCOMM Computer Communication Review
ACM Transactions on Computer Systems (TOCS)
Authentication of signatures using public key encryption
Communications of the ACM
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
On the validity of digital signatures
ACM SIGCOMM Computer Communication Review
Off-Line Fair Payment Protocols Using Convertible Signatures
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
Time-lock Puzzles and Timed-release Crypto
Time-lock Puzzles and Timed-release Crypto
A fair protocol for signing contracts
IEEE Transactions on Information Theory
New directions in cryptography
IEEE Transactions on Information Theory
Securing digital signatures for non-repudiation
Computer Communications
Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
A convertible group signature scheme
ACM SIGOPS Operating Systems Review
On timeliness of a fair non-repudiation protocol
InfoSecu '04 Proceedings of the 3rd international conference on Information security
An abuse-free fair contract signing protocol based on the RSA signature
WWW '05 Proceedings of the 14th international conference on World Wide Web
Implementing Fair Non-repudiable Interactions with Web Services
EDOC '05 Proceedings of the Ninth IEEE International EDOC Enterprise Computing Conference
An intruder model for verifying liveness in security protocols
Proceedings of the fourth ACM workshop on Formal methods in security
Compositional analysis of contract-signing protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
Generic non-repudiation protocols supporting transparent off-line TTP
Journal of Computer Security - On IWAP'05
Smart card-based agents for fair non-repudiation
Computer Networks: The International Journal of Computer and Telecommunications Networking
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
Efficient and secure protocol in fair document exchange
Computer Standards & Interfaces
A survey of electronic signature solutions in mobile devices
Journal of Theoretical and Applied Electronic Commerce Research
A fair Non-repudiation service in a web services peer-to-peer environment
Computer Standards & Interfaces
Fair exchange protocol of signatures based on aggregate signatures
Computer Communications
Multiparty nonrepudiation: A survey
ACM Computing Surveys (CSUR)
Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme
Fundamenta Informaticae - Fundamentals of Software Engineering 2007: Selected Contributions
A new fair non-repudiation protocol for secure negotiation and contract signing
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder
Formal Aspects in Security and Trust
A Non-repudiated Self-service Store System Based on Portable Trusted Device
Wireless Personal Communications: An International Journal
Generic Fair Non-Repudiation Protocols with Transparent Off-line TTP
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Extended electronic signature policies
Proceedings of the 2nd international conference on Security of information and networks
Distributed support for public and private accountability in digital ecosystems
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Some common attacks against certified email protocols and the countermeasures
Computer Communications
A new dependable exchange protocol
Computer Communications
An adaptive three-party accounting protocol
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies
Optimistic non-repudiation protocol analysis
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
An abuse-free fair contract-signing protocol based on the RSA signature
IEEE Transactions on Information Forensics and Security
Nuovo DRM paradiso: towards a verified fair DRM scheme
FSEN'07 Proceedings of the 2007 international conference on Fundamentals of software engineering
On-the-fly model checking of fair non-repudiation protocols
ATVA'07 Proceedings of the 5th international conference on Automated technology for verification and analysis
Reliable evidence: auditability by typing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Games for non-repudiation protocol correctness
International Journal of Wireless and Mobile Computing
Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator
Computers and Electrical Engineering
It's on me! the benefit of altruism in BAR environment
DISC'10 Proceedings of the 24th international conference on Distributed computing
Middleware support for complex and distributed security services in multi-tier web applications
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
An agent-mediated fair exchange protocol
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Enhancing security and privacy in certified mail systems using trust domain separation
ISC'10 Proceedings of the 13th international conference on Information security
E-ticketing scheme for mobile devices with exculpability
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Computer Networks: The International Journal of Computer and Telecommunications Networking
A shared certified mail system for the austrian public and private sectors
EGOVIS'11 Proceedings of the Second international conference on Electronic government and the information systems perspective
An extended model of rational exchange based on dynamic games of imperfect information
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
An optimistic NBAC-Based fair exchange method for arbitrary items
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Proof of service in a hybrid p2p environment
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Fairness and correctness in case of a premature abort
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Design and implementation of an inline certified e-mail service
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Game-based verification of multi-party contract signing protocols
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
On the security of a certified e-mail scheme with temporal authentication
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
On the security of a certified e-mail scheme
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
On the quest for impartiality: design and analysis of a fair non-repudiation protocol
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Generic, optimistic, and efficient schemes for fair certified email delivery
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
On secure orders in the presence of faults
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
An improved e-commerce protocol for fair exchange
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
A formal analysis of fairness and non-repudiation in the RSA-CEGD protocol
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
An interoperability standard for certified mail systems
Computer Standards & Interfaces
Non-repudiation protocols for multiple entities
Computer Communications
Game-based verification of contract signing protocols with minimal messages
Innovations in Systems and Software Engineering
Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme
Fundamenta Informaticae - Fundamentals of Software Engineering 2007: Selected Contributions
DCast: sustaining collaboration in overlay multicast despite rational collusion
Proceedings of the 2012 ACM conference on Computer and communications security
Intrusion attack tactics for the model checking of e-commerce security guarantees
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Model checking under fairness in proB and its application to fair exchange protocols
ICTAC'12 Proceedings of the 9th international conference on Theoretical Aspects of Computing
A Practical Approach of Fairness in E-Procurement
International Journal of Information Security and Privacy
What's a little collusion between friends?
Proceedings of the 2013 ACM symposium on Principles of distributed computing
Hi-index | 0.24 |
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Non-repudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having participated in a part or the whole of this communication. Therefore a fair non-repudiation protocol has to generate non-repudiation of origin evidences intended to Bob, and non-repudiation of receipt evidences destined to Alice. In this paper, we clearly define the properties a fair non-repudiation protocol must respect, and give a survey of the most important non-repudiation protocols without and with trusted third party (TTP). For the later ones we discuss the evolution of the TTP's involvement and, between others, describe the most recent protocol using a transparent TTP. We also discuss some ad-hoc problems related to the management of non-repudiation evidences.