Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Journal of Network and Computer Applications
Password authentication with insecure communication
Communications of the ACM
Authentication of signatures using public key encryption
Communications of the ACM
Electronic Payments of Small Amounts
Proceedings of the International Workshop on Security Protocols
Formal Analysis of a Non-Repudiation Protocol
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Towards a framework for handling disputes in payment systems
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Certificate revocation and certificate update
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
Information Systems Frontiers
On timeliness of a fair non-repudiation protocol
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A transactional-cycle approach to evidence management for dispute resolution
Information and Management
An intensive survey of fair non-repudiation protocols
Computer Communications
Hi-index | 0.00 |
Due to the explosive growth of electronic businesses carried on the Internet, non-repudiation services turn out to be increasingly important. Non-repudiation services protect the transacting parties against any false denial that a particular event or action has taken place, in which evidence will be generated, collected and maintained to enable the settlement of disputes. Several fair non-repudiation protocols have been proposed, which support non-repudiation of origin and non-repudiation of receipt while neither the originator nor the recipient can gain an advantage by quitting prematurely or otherwise misbehaving during a transaction. However, a critical issue on how to maintain the validity of non-repudiation evidence efficiently during and after a transaction was not considered. This paper uses the idea of evidence chaining to address such a problem.