Skip to main content

Evolution of Fair Non-repudiation with TTP

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1587))

Included in the following conference series:

Abstract

Non-repudiation turns out to be an increasingly important security service with the fast growth of electronic commerce on the Internet. Non-repudiation services protect the transacting parties against any false denial that a particular event or action has taken place, in which evidence will be generated, collected and maintained to enable dispute resolution. Meanwhile, fairness is a further desirable requirement such that neither party can gain an advantage by quitting prematurely or otherwise misbehaving during a transaction. In this paper, we survey the evolution of techniques and protocols that had been put forward to achieve fair non-repudiation with a (trusted) third party, and present a secure and efficient fair non-repudiation protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N. Asokan, M. Schunter and M. Waidner. Optimistic protocols for fair exchange. Proceedings of 4th ACM Conference on Computer and Communications Security, pages 7–17, Zurich, Switzerland, April 1997.

    Google Scholar 

  2. N. Asokan, V. Shoup and M. Waidner. Asynchronous protocols for optimistic fair exchange. Proceedings of 1998 IEEE Symposium on Security and Privacy, pages 86–99, Oakland, California, May 1998.

    Google Scholar 

  3. A. Bahreman and J. D. Tygar. Certified electronic mail. Proceedings of the Internet Society Symposium on Network and Distributed System Security, pages 3–19, San Diego, California, February 1994.

    Google Scholar 

  4. F. Bao, R. H. Deng and W. Mao. Efficient and practical fair exchange protocols with off-line TTP. Proceedings of 1998 IEEE Symposium on Security and Privacy, pages 77–85, Oakland, California, May 1998.

    Google Scholar 

  5. M. Ben-Or, O. Goldreich, S. Micali and R. Rivest. A fair protocol for signing contracts. IEEE Transactions on Information Theory, IT-36(1):40–46, January 1990.

    Article  Google Scholar 

  6. E. F. Brickell, D. Chaum, I. B. Damgard and J. van de Graaf. Gradual and verifiable release of a secret. Lecture Notes in Computer Science 293, Advances in Cryptology: Proceedings of Crypto’87, pages 156–166, Santa Barbara, California, August 1987.

    Google Scholar 

  7. CCITT. Recommendation X.509: The directory-Authentication framework. November 1988.

    Google Scholar 

  8. R. Cleve. Controlled gradual disclosure schemes for random bits and their applications. Lecture Notes in Computer Science 435, Advances in Cryptology: Proceedings of Crypto’89, pages 573–588, Santa Barbara, California, August 1989.

    Chapter  Google Scholar 

  9. T. Coffey and P. Saidha. Non-repudiation with mandatory proof of receipt. Computer Communication Review, 26(1):6–17, January 1996.

    Article  Google Scholar 

  10. B. Cox, J. D. Tygar and M. Sirbu. NetBill security and transaction protocol. Proceedings of the First USENIX Workshop on Electronic Commerce, pages 77–88, July 1995.

    Google Scholar 

  11. I. B. Damgard. Practical and provably secure release of a secret and exchange of signatures. Lecture Notes in Computer Science 765, Advances in Cryptology: Proceedings of Eurocrypt’93, pages 200–217, Lofthus, Norway, May 1993.

    Google Scholar 

  12. R. H. Deng, L. Gong, A. A. Lazar and W. Wang. Practical protocols for certified electronic mail. Journal of Network and Systems Management, 4(3):279–297, 1996.

    Article  Google Scholar 

  13. M. Franklin and M. Reiter. Fair exchange with a semi-trusted third party. Proceedings of 4th ACM Conference on Computer and Communications Security, pages 1–6, Zurich, Switzerland, April 1997.

    Google Scholar 

  14. ISO/IEC 13888-1. Information technology-Security techniques-Non-repudiation-Part 1: General. ISO/IEC, 1997.

    Google Scholar 

  15. ISO/IEC 13888-2. Information technology-Security techniques-Non-repudiation-Part 2: Mechanisms using symmetric techniques. ISO/IEC, 1998.

    Google Scholar 

  16. ISO/IEC 13888-3. Information technology-Security techniques-Non-repudiation-Part 3: Mechanisms using asymmetric techniques. ISO/IEC, 1997.

    Google Scholar 

  17. T. Okamoto and K. Ohta. How to simultaneously exchange secrets by general assumptions. Proceedings of 2nd ACM Conference on Computer and Communications Security, pages 184–192, Fairfax, Virginia, November 1994.

    Google Scholar 

  18. J. B. Postel and J. K. Reynolds. File transfer protocol. RFC 959, October 1985.

    Google Scholar 

  19. N. Zhang and Q. Shi. Achieving non-repudiation of receipt. The Computer Journal, 39(10):844–853, 1996.

    Article  Google Scholar 

  20. J. Zhou and D. Gollmann. A fair non-repudiation protocol. Proceedings of 1996 IEEE Symposium on Security and Privacy, pages 55–61, Oakland, California, May 1996.

    Google Scholar 

  21. J. Zhou. Non-repudiation. PhD Thesis, University of London, December 1996.

    Google Scholar 

  22. J. Zhou and D. Gollmann. An efficient non-repudiation protocol. Proceedings of 10th IEEE Computer Security Foundations Workshop, pages 126–132, Rockport, Massachusetts, June 1997.

    Google Scholar 

  23. J. Zhou, R. H. Deng and F. Bao. Some remarks on a fair exchange protocol. (manuscript)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhou, J., Deng, R., Bao, F. (1999). Evolution of Fair Non-repudiation with TTP. In: Pieprzyk, J., Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 1999. Lecture Notes in Computer Science, vol 1587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48970-3_21

Download citation

  • DOI: https://doi.org/10.1007/3-540-48970-3_21

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65756-9

  • Online ISBN: 978-3-540-48970-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics