NON-REPUDIATION - CONSTITUTING EVIDENCE AND PROOF IN DIGITAL COOPERATION

被引:6
|
作者
HERDA, S [1 ]
机构
[1] NATL RES CTR COMP SCI,GMD,D-64295 DARMSTADT,GERMANY
关键词
NON-REPUDIATION; EVIDENCE; ACCOUNTABILITY; AUTHENTICATION; INTEGRITY; CERTIFICATION; DIGITAL SIGNATURES; PROOF OF ORIGIN; PROOF OF RECEIPT; PROOF OF SUBMISSION; PROOF OF DELIVERY; TRUSTED 3RD PARTY; TIME STAMPING;
D O I
10.1016/0920-5489(94)00044-H
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In digital cooperation, mechanisms and services have to be provided to account for actions and information to entities. Digital signatures are regarded as a means of establishing accountability, the property that ensures that the actions of an entity may be traced uniquely to that entity. However, to constitute proof of origin, submission, delivery and receipt, digital signature techniques have to be supported by certification, time stamping and notarisation techniques and services. The techniques providing proofs are called non-repudiation techniques. Working Group 2 of ISO/IEC JTC1/SC27 (Security Techniques) is concerned with the standardization of security mechanisms and algorithms such as digital signatures. A new work item has been defined on non-repudiation techniques using asymmetric (digital signatures) as well as symmetric cryptographic techniques.
引用
收藏
页码:69 / 79
页数:11
相关论文
共 50 条
  • [1] A proof of non-repudiation
    Bella, G
    Paulson, LC
    [J]. SECURITY PROTOCOLS, 2002, 2467 : 119 - 125
  • [2] Evidence and non-repudiation
    Zhou, JY
    Gollmann, D
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 1997, 20 (03) : 267 - 281
  • [3] A proof of non-repudiation - (Transcript of discussion)
    Paulson, L
    [J]. SECURITY PROTOCOLS, 2002, 2467 : 126 - 133
  • [4] Securing digital signatures for non-repudiation
    Zhou, J
    Lam, KY
    [J]. COMPUTER COMMUNICATIONS, 1999, 22 (08) : 710 - 716
  • [5] SM9 Digital Signature with Non-repudiation
    Wang, Meng
    Long, Yihong
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2020), 2020, : 356 - 361
  • [6] The design and analysis of an electronic evidence and non-repudiation protocol
    Yuan, D
    Guo, T
    Fan, PZ
    [J]. ISADS 2005: International Symposium on Autonomous Decentralized Systems,Proceedings, 2005, : 570 - 573
  • [7] An efficient non-repudiation protocol
    Zhou, JY
    Gollmann, D
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 126 - 132
  • [8] A fair non-repudiation protocol
    Meng, B
    Wang, SM
    Xiong, QX
    [J]. PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON CSCW IN DESIGN, 2002, : 68 - 73
  • [9] Establishing chain of evidence as a base for non-repudiation services
    Hwang, JJ
    Shao, MH
    Wu, SS
    [J]. SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 49 - 60
  • [10] Non-repudiation Analysis with LYSA
    Bruso, Mayla
    Cortesi, Agostino
    [J]. EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST, 2009, 297 : 318 - 329