Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
A new fair non-repudiation protocol for secure negotiation and contract signing
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
A new method for formalizing optimistic fair exchange protocols
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Hi-index | 0.00 |
We deal with two claws of Zhou-Gollmann's fair non-repudiation protocol. Firstly, their protocol divides a message into 2 parts, i.e., a key K and a cipher-text C. Then, C is delivered to the recipient, while K is submitted to TTP (Trusted Third Party).If the originator doesn't submit K to TTP, then the protocol appears to have no dispute between the originator and the recipient. However, the protocol depends on his action on whether the originator really submits K to TTP or not.We show that the originator can make the protocol unfair by using his advantageous position, and present how to improve the fairness of the protocol. Secondly, the protocol doesn't provide the message privacy. This means that additional protocols are required to transfer an important message in private. We propose an improved version of the protocol to guarantee the message privacy.