An intensive survey of fair non-repudiation protocols

  • Authors:
  • Steve Kremer;Olivier Markowitch;Jianying Zhou

  • Affiliations:
  • Université Libre de Bruxelles, Boulevard du Triomphe CP212, 1050 Bruxelles, Belgium;Université Libre de Bruxelles, Boulevard du Triomphe CP212, 1050 Bruxelles, Belgium;Labs for Information Technology, 21 Heug Mui Keng Terrace, Singapore 119613

  • Venue:
  • Computer Communications
  • Year:
  • 2002

Quantified Score

Hi-index 0.24

Visualization

Abstract

With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Non-repudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having participated in a part or the whole of this communication. Therefore a fair non-repudiation protocol has to generate non-repudiation of origin evidences intended to Bob, and non-repudiation of receipt evidences destined to Alice. In this paper, we clearly define the properties a fair non-repudiation protocol must respect, and give a survey of the most important non-repudiation protocols without and with trusted third party (TTP). For the later ones we discuss the evolution of the TTP's involvement and, between others, describe the most recent protocol using a transparent TTP. We also discuss some ad-hoc problems related to the management of non-repudiation evidences.