34,194 Hits in 3.8 sec

A key authentication scheme with non-repudiation

Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee
2004 ACM SIGOPS Operating Systems Review  
However, their scheme did not achieve non-repudiation of public key.  ...  In order to achieve non-repudiation of public key, two improvements of key authentication scheme for non-repudiation are discussed in this paper.  ...  Hence, non-repudiation of public key in ZLYH-scheme is vulnerable.  ... 
doi:10.1145/1035834.1035843 fatcat:2qjyqd7lkrbivco7ebdttu63ei

An intensive survey of fair non-repudiation protocols

Steve Kremer, Olivier Markowitch, Jianying Zhou
2002 Computer Communications  
In this paper, we clearly define the properties a fair non-repudiation protocol must respect, and give a survey of the most important non-repudiation protocols without and with trusted third party (TTP  ...  Therefore a fair non-repudiation protocol has to generate non-repudiation of origin evidences intended to Bob, and non-repudiation of receipt evidences destined to Alice.  ...  encryption function under key k • D k (): a symmetric-key decryption function under key k • E X (): a public-key encryption function under X's public key • D X (): a public-key decryption function under  ... 
doi:10.1016/s0140-3664(02)00049-x fatcat:xj4uk6iig5cr7b7hc5cyct5u7q

A Multi-Party Non-Repudiation Protocol [chapter]

Steve Kremer, Olivier Markowitch
2000 IFIP Advances in Information and Communication Technology  
We present a multi-party non-repudiation protocol, based on a group encryption scheme.  ...  We define multi-party non-repudiation, compare it to multi-party fair exchange and show some fundamental differences between these two problems.  ...  It is based on a public-key encryption scheme and on the chinese remainder theorem. This method is generic as it can use any secure public-key cryptosystem.  ... 
doi:10.1007/978-0-387-35515-3_28 fatcat:fmzc7aej6zglrmuejo3z5py7hm

Fair multi-party non-repudiation protocols

Steve Kremer, Olivier Markowitch
2003 International Journal of Information Security  
We define the aims of multi-party non-repudiation protocols, compare them to multi-party fair exchange and show some fundamental differences.  ...  A digital signature, that can be used as a non-repudiation evidence, provides a link between a message and a public verification key.  ...  The ciphering key can be public and the deciphering key has to remain secret.  ... 
doi:10.1007/s10207-003-0019-3 fatcat:yxoabvo3onfx3bwakpwm2e4tqa


2016 Journal of Naval Science and Engineering  
As a solution to fair exchange problem, non-repudiation protocols are being widely used over digital environment.  ...  In this paper we present a strong fair hybrid non-repudiation protocol which works with all types of pairings.  ...  any key distribution for public keys.  ... 
doaj:c292c2255c9e434584684ee306db340f fatcat:po7zszxiencz3lm2uedwexkssy

Quantitative Analysis of Non Repudiable Protocol for Remote Voting

Saira Yousuf, Malik Sikandar Hayat Khayal, Imran Sohail, Aihab Khan
2012 Journal of clean energy technologies  
The basic purpose of this research paper in to provide the quantitative analysis of a proposed non repudiable scheme in the published research paper named "Non Repudiation for Remote Voting".  ...  Non-repudiation provides the proof of the casted vote and ensures the authenticity of voter using digital signatures.  ...  Public key is (p, q, g, y). Private Key is x.  ... 
doi:10.7763/ijcte.2012.v4.459 fatcat:t5wzpwxbafhhrfofpa4hjugcje

Signcryption with Non-interactive Non-repudiation without Random Oracles [chapter]

Jia Fan, Yuliang Zheng, Xiaohu Tang
2010 Lecture Notes in Computer Science  
Non-interactive non-repudiation enables a receiver to settle a repudiation dispute with the help of a judge without the need to engage in costly multi-round interactive communications with the judge.  ...  unforgeability and the other about the confidentiality of non-repudiation evidence.  ...  -Forge: A generates the sender's public key P K S * , outputs a message M * , a piece of non-repudiation evidence d * , and a signcryptext σ * .  ... 
doi:10.1007/978-3-642-17499-5_9 fatcat:zahpsa2vpjfrvhmg3vjzmliuxa

An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party [chapter]

Olivier Markowitch, Steve Kremer
2001 Lecture Notes in Computer Science  
In a non-repudiation protocol, during which Alice wants to transmit a message to Bob, Alice has to send a non-repudiation of origin evidence to Bob (attesting that Alice is at the origin of the transmitted  ...  message), and Bob has to send a non-repudiation of receipt evidence to Alice (attesting Bob's receipt of the message).  ...  under key k -E X (): a public-key encryption function under X's public key -D X (): a public-key decryption function under X's private key -S X (): the signature function of entity X m: the message sent  ... 
doi:10.1007/3-540-45439-x_25 fatcat:nhpczigryvf7belxedrxrvq6de

Non-repudiation protocols for multiple entities

Jose A. Onieva, Jianying Zhou, Javier Lopez
2004 Computer Communications  
In this paper, we introduce the state-of-the-art of non-repudiation protocols for multiple entities.  ...  Non-repudiation is a security service that provides cryptographic evidence to support the settlement of disputes.  ...  (In fact, three steps are the minimum number of steps we could reach without breaking fairness in non-repudiation protocols.)  ... 
doi:10.1016/j.comcom.2004.06.003 fatcat:ydvqoxcmnrc5fnv5hpgjvuyjt4

A software framework for non-repudiation service in electronic commerce based on the Internet

Sungwoo Tak, Yugyung Lee, Eun Kyo Park
2003 Microprocessors and microsystems  
First, unlike other frameworks, it is interested in a successful completion of ecommerce transactions by supporting non-repudiation of service.  ...  We propose a software framework for non-repudiation service in e-commerce (electronic commerce) on the Internet. The proposed software framework is an explicit security framework for notary service.  ...  public key.  ... 
doi:10.1016/s0141-9331(03)00027-9 fatcat:47gorj2dtjgkthvquakjz3ovve

A Multi-party Optimistic Non-repudiation Protocol [chapter]

Olivier Markowitch, Steve Kremer
2001 Lecture Notes in Computer Science  
In this paper we consider the optimistic approach of the non-repudiation protocols.  ...  We study a non-repudiation protocol with off-line trusted third party and we keep on with the definition of the multi-party non-repudiation, compare it to multi-party fair exchange and show some fundamental  ...  A digital signature provides an irrefutable non-repudiation of origin evidence: a digital signature creates a link between a message and a public verification key.  ... 
doi:10.1007/3-540-45247-8_9 fatcat:3fvf7z6d3zae5oca26sxniph6m

Continuous Biometric Verification for Non-Repudiation of Remote Services

E. Schiavone, A. Ceccarelli, A. Bondavalli
2017 Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17  
Further, non-repudiation should be guaranteed by mechanisms that do not reduce the usability of the system or application.  ...  Amongst such services, non-repudiation provides evidences of actions, protects against their denial, and helps solving disputes between parties.  ...  A knows its own public key certificate and the associated private key, B knows its own public key certificate and associated private key, and the corresponding public key certificates are available to  ... 
doi:10.1145/3098954.3098969 dblp:conf/IEEEares/SchiavoneCB17 fatcat:5p33mzy5ufdrvnq77l5vg24zqi

Security Protocol for Data Transmission in Cloud Computing

Dr. Abdelrahman ElSharif Karrar
2018 International Journal of Advanced Trends in Computer Science and Engineering  
We used in this paper a private and public key scheme to verify data confidentiality. Additionally, we used a hash function to verify data integrity.  ...  Finally, data authenticity and non-repudiation have been verified by applying the digital signature mechanism.  ...  Data authenticity and non-repudiation have verified by apply digital signature. We recommend using AES for data encryption and elliptic curve as public-key scheme.  ... 
doi:10.30534/ijatcse/2018/01712018 fatcat:sehknosk2bdpzgfxip6irlwbzi

A nonrepudiable bitstring commitment scheme based on a public-key cryptosystem

J. Castella-Roca, J. Domingo-Ferrer
2004 International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.  
We present a commitment scheme which avoids hash functions by using a public-key cryptosystem instead.  ...  A party Alice commits to a value v (a bit or a bitstring) without revealing it. Alice should not be able to cheat by opening the commitment as v = v nor to deny having committed at all.  ...  Using a public-key cryptosystem to construct a commitment is a way of achieving non-repudiability, a property which cannot be offered by hash functions alone.  ... 
doi:10.1109/itcc.2004.1286752 dblp:conf/itcc/Castella-RocaD04 fatcat:tlgmowfunzdmbpm6blxzryqbmq

A Public Keys Based Architecture for P2P Identification, Content Authenticity and Reputation

Neander L. Brisola, Altair O. Santin, Lau C. Lung, Heverson B. Ribeiro, Marcelo H. Vithoft
2009 2009 International Conference on Advanced Information Networking and Applications Workshops  
This work proposes applying public keys to identify peers. It allows creating a persistent identification scheme, without losing anonymity, even in a self-managed environment as P2P.  ...  In order to provide credibility to the non-certified content and public keys a reputation mechanism is applied. We have developed a prototype to show the benefits of this approach.  ...  P2 web server records the public key of the peer P3 to avoid non-repudiation.  ... 
doi:10.1109/waina.2009.139 dblp:conf/aina/BrisolaSLRV09 fatcat:zx25cxdwxrcd3jzgmn36yrcjme
« Previous Showing results 1 — 15 out of 34,194 results