Non-repudiation: constituting evidence and proof in digital cooperation
Computer Standards & Interfaces - Special issue: German National Research Center for computer science (GMD)
Network Security: Design of a Global Secure Link
IFIP/Sec '92 Proceedings of the IFIP TC11, Eigth International Conference on Information Security: IT Security: The Need for International Cooperation
A large-scale contents publishing architecture based on reliable multicast
SIGDOC '97 Proceedings of the 15th annual international conference on Computer documentation
Escrow services and incentives in peer-to-peer networks
Proceedings of the 3rd ACM conference on Electronic Commerce
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
Evolution of Fair Non-repudiation with TTP
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Optimistic Fair Exchange with Transparent Signature Recovery
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
An Efficient Protocol for Certified Electronic Mail
ISW '00 Proceedings of the Third International Workshop on Information Security
Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
A systematic approach for encryption and authentication with fault tolerance
Computer Networks: The International Journal of Computer and Telecommunications Networking
Certified mail: the next challenge for secure messaging
Communications of the ACM - Interactive immersion in 3D graphics
A transactional-cycle approach to evidence management for dispute resolution
Information and Management
Implementing Fair Non-repudiable Interactions with Web Services
EDOC '05 Proceedings of the Ninth IEEE International EDOC Enterprise Computing Conference
A Mobile Ticket System Based on Personal Trusted Device
Wireless Personal Communications: An International Journal
Generic non-repudiation protocols supporting transparent off-line TTP
Journal of Computer Security - On IWAP'05
Smart card-based agents for fair non-repudiation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Providing Certified Mail Services on the Internet
IEEE Security and Privacy
Receipt management- transaction history based trust establishment
Proceedings of the 2007 ACM workshop on Digital identity management
Efficient and secure protocol in fair certified E-mail delivery
WSEAS Transactions on Information Science and Applications
A Non-repudiated Self-service Store System Based on Portable Trusted Device
Wireless Personal Communications: An International Journal
Generic Fair Non-Repudiation Protocols with Transparent Off-line TTP
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
On fairness in exchange protocols
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Design and implementation of an inline certified e-mail service
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
WISA'04 Proceedings of the 5th international conference on Information Security Applications
An intensive survey of fair non-repudiation protocols
Computer Communications
Securing digital signatures for non-repudiation
Computer Communications
An efficient certified email protocol
ISC'07 Proceedings of the 10th international conference on Information Security
Hi-index | 0.00 |
Non-repudiation allows an exchange of data between two principals in such a manner that the principals cannot subsequently deny their participation in the exchange. Current non-repudiation schemes, while providing a mandatory proof of origin service, generally provide only discretionary proof of receipt since it is difficult to enforce the return of the proof of receipt by the recipient.In this paper a new scheme for achieving mandatory mutual non-repudiation is proposed, encompassing both mandatory proof of origin and mandatory proof of receipt. The fundamental feature of the scheme is that the proofs of origin and receipt are not exchanged until both principals have submitted their digitally signed evidence to a trusted third party intermediary. This ensures that if the non-repudiation protocol is not completed, neither principal can gain from the exchange. An added advantage is that the process of dispute arbitration is considerably simplified since a small number of rules are required to decide whether an alleged data exchange took place.