Filters








6,106 Hits in 3.2 sec

A Game-Based Verification of Non-repudiation and Fair Exchange Protocols [chapter]

Steve Kremer, Jean-François Raskin
2001 Lecture Notes in Computer Science  
In this paper, we report on a recent work for the verification of non-repudiation protocols.  ...  We propose a verification method based on the idea that non-repudiation protocols are best modeled as games.  ...  The MK multi-party non-repudiation protocol We also studied the multi-party non-repudiation protocol presented in [17] .  ... 
doi:10.1007/3-540-44685-0_37 fatcat:5h6xtmxuxvgknadcnsgglfg3uq

A new fair non-repudiation protocol for secure negotiation and contract signing

A. Ruiz-Martínez, C. I. Marín-López, L. Baño-López, A. F. Gómez Skarmeta
2006 Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Services - PST '06  
In this paper, we present a new protocol which is designed to make negotiation and contract signing processes secure and confidential.  ...  However, until now, e-contract signing protocols have not considered these issues as an essential part of the protocol.  ...  This work has been partially funded by "Programa de Ayuda a los Grupos de Excelencia de la Fundación Séneca 04552/GERM/06".  ... 
doi:10.1145/1501434.1501454 dblp:conf/pst/Ruiz-MartinezMBG06 fatcat:w5ik3cp3a5hhnfcdziubaj6bhm

On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol [chapter]

J. Cederquist, R. Corin, M. Torabi Dashti
2005 Lecture Notes in Computer Science  
We design and analyze a simple optimistic fair non-repudiation protocol.  ...  Finally, to provide further confidence in the protocol, several vulnerabilities on weaker versions of our protocol are exposed.  ...  A Fair Non-repudiation Protocol In this section we describe our fair non-repudiation protocol.  ... 
doi:10.1007/11602897_3 fatcat:3g5gwuwtj5bh7jqci2s76oit74

A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol [chapter]

Almudena Alcaide, Juan M. Estévez-Tapiador, Antonio Izquierdo, José M. Sierra
2005 Lecture Notes in Computer Science  
This is a relatively complex scheme based on verifiable and recoverable encrypted signatures (VRES) to guarantee properties such as strong fairness and non-repudiation, among others.  ...  The study performed within this framework reveals the lack of non-repudiation in RSA-CEGD and points out some other weaknesses.  ...  However, many of the protocols proposed to achieve fair non-repudiation have not been subject to a formal security analysis.  ... 
doi:10.1007/11424925_136 fatcat:row53vlnvjfgtnhjyrqv4faezq

The rigorous implementation of a fair exchange protocol for non-repudiable Web service interactions - a case study

N. Cook, P. Robinson, S. Shrivastava
2007 2007 IEEE 23rd International Conference on Data Engineering Workshop  
This paper presents a case study on the implementation of a deterministically fair non-repudiation protocol. Such protocols are among the most complex of security protocols.  ...  Finally, to satisfy requirements such as non-repudiable audit, significant infrastructure support is needed. The case study demonstrates an improved approach to protocol implementation.  ...  The protocol uses an inline TTP to achieve fair, non-repudiable delivery of a business message.  ... 
doi:10.1109/icdew.2007.4401010 dblp:conf/icde/CookRS07 fatcat:wcsxoki2nrebtbzfmsgoshiqi4

A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols [chapter]

Kun Wei, James Heather
Lecture Notes in Computer Science  
We use a PVS embedding of the stable failures model of CSP to verify non-repudiation protocols, allowing us to prove the correctness of properties that are difficult to analyze in full generality with  ...  The PVS formalization comprises a semantic embedding of CSP and a collection of theorems and proof rules for reasoning about non-repudiation properties.  ...  We also wish to cover timeliness; that is, we wish to verify that all honest parties can reach a point where they can stop the protocol while preserving fairness.  ... 
doi:10.1007/978-3-540-75227-1_14 fatcat:e4ktf62torcgblsfevsrlranjy

On the Security of Fair Non-repudiation Protocols [chapter]

Sigrid Gürgens, Carsten Rudolph, Holger Vogt
2003 Lecture Notes in Computer Science  
The application of these countermeasures is finally shown by our construction of a new fair non-repudiation protocol.  ...  We analyzed two non-repudiation protocols and found some new attacks on the fairness and termination property of these protocols.  ...  The application of these countermeasures is finally shown by our construction of a new fair non-repudiation protocol.  ... 
doi:10.1007/10958513_15 fatcat:bha4ukrtybckdpvsjz4evsi7na

On the security of fair non-repudiation protocols

Sigrid Gürgens, Carsten Rudolph, Holger Vogt
2005 International Journal of Information Security  
The application of these countermeasures is finally shown by our construction of a new fair non-repudiation protocol.  ...  We analyzed two non-repudiation protocols and found some new attacks on the fairness and termination property of these protocols.  ...  The application of these countermeasures is finally shown by our construction of a new fair non-repudiation protocol.  ... 
doi:10.1007/s10207-004-0063-7 fatcat:dzw4dqkc2jcp7jey4cgyjufwuu

An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party [chapter]

Olivier Markowitch, Steve Kremer
2001 Lecture Notes in Computer Science  
In a non-repudiation protocol, during which Alice wants to transmit a message to Bob, Alice has to send a non-repudiation of origin evidence to Bob (attesting that Alice is at the origin of the transmitted  ...  message), and Bob has to send a non-repudiation of receipt evidence to Alice (attesting Bob's receipt of the message).  ...  Although a non-repudiation protocol could be seen as a special instance of a fair exchange protocol-an exchange of a message and a non-repudiation of origin evidence against a non-repudiation of receipt  ... 
doi:10.1007/3-540-45439-x_25 fatcat:nhpczigryvf7belxedrxrvq6de

Analyzing for Fairness Electronic Commerce Protocol Formally

MEI ZHANG, FEI FENG, ZHI-LONG ZHANG, JING-HUA WEN
2018 DEStech Transactions on Computer Science and Engineering  
A new approach is proposed for analyzing fairness and non-repudiation of electronic commerce protocols in this paper.  ...  The authentication E-mail protocol (Certified electronic mail) is modeled as finite state machine, and analyzed in two vital aspects: Fairness and non-repudiation using Symbol Model Verification.  ...  The definition of fairness is as follows: Definition 1: That a non-repudiation protocol is fair means that the protocol can provide the sender and the receiver respectively valid non-repudiation evidence  ... 
doi:10.12783/dtcse/cmsms2018/25239 fatcat:qkha4g6vavhfdi3lignqqtqzui

Formal Analysis of a Fairness E-Commerce Protocol

Mei Zhang, Jing-Hua Wen
2013 Research Journal of Applied Sciences Engineering and Technology  
In this study, a new approach is proposed for analyzing non-repudiation and fairness of E-commerce protocols.  ...  The authentication E-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects-non-repudiation and fairness using SMV.  ...  The definition of fairness is as follows: Definition 1: That a non-repudiation protocol is fair means that the protocol can provide the sender and the receiver respectively valid non-repudiation evidence  ... 
doi:10.19026/rjaset.6.3866 fatcat:4lddfigenjbunleyceq5sohql4

Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder [chapter]

Francis Klay, Laurent Vigneron
2009 Lecture Notes in Computer Science  
In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol.  ...  Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary.  ...  Running Example: the FairZG Protocol In this section we describe the Fair Zhou-Gollmann protocol (FairZG) [31] , a fair non-repudiation protocol that uses a TTP.  ... 
doi:10.1007/978-3-642-01465-9_13 fatcat:amx7s6mzavax3eqo6m7i4x3uci

Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder [article]

Francis Klay, Laurent Vigneron
2007 arXiv   pre-print
In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol.  ...  Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary.  ...  Zhou-Gollmann protocol and in two fair non-repudiation protocols [7, 22] .  ... 
arXiv:0710.3305v2 fatcat:w6gj67eb6jawvezxoffoboupse

An intensive survey of fair non-repudiation protocols

Steve Kremer, Olivier Markowitch, Jianying Zhou
2002 Computer Communications  
Therefore a fair non-repudiation protocol has to generate non-repudiation of origin evidences intended to Bob, and non-repudiation of receipt evidences destined to Alice.  ...  In this paper, we clearly define the properties a fair non-repudiation protocol must respect, and give a survey of the most important non-repudiation protocols without and with trusted third party (TTP  ...  A fair non-repudiation protocol Here is the first fair non-repudiation protocol. The protocol is divided into two sub-protocols, a main and a recovery protocol.  ... 
doi:10.1016/s0140-3664(02)00049-x fatcat:xj4uk6iig5cr7b7hc5cyct5u7q

A Multi-party Optimistic Non-repudiation Protocol [chapter]

Olivier Markowitch, Steve Kremer
2001 Lecture Notes in Computer Science  
We study a non-repudiation protocol with off-line trusted third party and we keep on with the definition of the multi-party non-repudiation, compare it to multi-party fair exchange and show some fundamental  ...  Afterwards, we define the multi-party non-repudiation problem, showing some differences with multi-party fair exchange. The requirements of a multi-party non-repudiation protocol are defined as well.  ...  Requirements on Non-repudiation Protocols A first property non-repudiation protocols must provide is fairness. One can distinguish between the two notions of strong fairness and weak fairness.  ... 
doi:10.1007/3-540-45247-8_9 fatcat:3fvf7z6d3zae5oca26sxniph6m
« Previous Showing results 1 — 15 out of 6,106 results