Some applications of multiple key ciphers
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
Cryptosystem for group oriented cryptography
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
Fairness in electronic commerce
Fairness in electronic commerce
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Evolution of Fair Non-repudiation with TTP
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Observations on Non-repudiation
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
A Multi-Party Non-Repudiation Protocol
Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures
Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party
DEXA '99 Proceedings of the 10th International Workshop on Database & Expert Systems Applications
An Efficient Non-repudiation Protocol
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
A Realistic Protocol for Multi-party Certified Electronic Mail
ISC '02 Proceedings of the 5th International Conference on Information Security
A Game-Based Verification of Non-repudiation and Fair Exchange Protocols
CONCUR '01 Proceedings of the 12th International Conference on Concurrency Theory
A game-based verification of non-repudiation and fair exchange protocols
Journal of Computer Security - IFIP 2000
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Compositional analysis of contract-signing protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
Multiparty nonrepudiation: A survey
ACM Computing Surveys (CSUR)
No Author-Based Selective Receipt in Certified Email with Tight Trust Requirements
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Formal analysis and improvement of multi-party non-repudiation protocol
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Estimation of TTP features in non-repudiation service
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Fairness in non-repudiation protocols
STM'11 Proceedings of the 7th international conference on Security and Trust Management
A Practical Approach of Fairness in E-Procurement
International Journal of Information Security and Privacy
Hi-index | 0.00 |
In this paper we consider the optimistic approach of the non-repudiation protocols. We study a non-repudiation protocol with off-line trusted third party and we keep on with the definition of the multi-party non-repudiation, compare it to multi-party fair exchange and show some fundamental differences between these two problems. Finally, we generalize our protocol and propose a multi-party nonrepudiation protocol with off-line trusted third party.