NON-REPUDIATION - CONSTITUTING EVIDENCE AND PROOF IN DIGITAL COOPERATION

被引:6
|
作者
HERDA, S [1 ]
机构
[1] NATL RES CTR COMP SCI,GMD,D-64295 DARMSTADT,GERMANY
关键词
NON-REPUDIATION; EVIDENCE; ACCOUNTABILITY; AUTHENTICATION; INTEGRITY; CERTIFICATION; DIGITAL SIGNATURES; PROOF OF ORIGIN; PROOF OF RECEIPT; PROOF OF SUBMISSION; PROOF OF DELIVERY; TRUSTED 3RD PARTY; TIME STAMPING;
D O I
10.1016/0920-5489(94)00044-H
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In digital cooperation, mechanisms and services have to be provided to account for actions and information to entities. Digital signatures are regarded as a means of establishing accountability, the property that ensures that the actions of an entity may be traced uniquely to that entity. However, to constitute proof of origin, submission, delivery and receipt, digital signature techniques have to be supported by certification, time stamping and notarisation techniques and services. The techniques providing proofs are called non-repudiation techniques. Working Group 2 of ISO/IEC JTC1/SC27 (Security Techniques) is concerned with the standardization of security mechanisms and algorithms such as digital signatures. A new work item has been defined on non-repudiation techniques using asymmetric (digital signatures) as well as symmetric cryptographic techniques.
引用
收藏
页码:69 / 79
页数:11
相关论文
共 50 条
  • [21] A non-repudiation metering scheme
    Harn, L
    Lin, HY
    [J]. IEEE COMMUNICATIONS LETTERS, 2001, 5 (12) : 486 - 487
  • [22] Non-repudiation and the metaphysics of presence
    Roe, Michael
    [J]. SECURITY PROTOCOLS, 2007, 4631 : 207 - 214
  • [23] A Signature Scheme with Non-Repudiation
    XIN Xiangjun~ 1
    2.Department of Information and Computing Science
    [J]. Wuhan University Journal of Natural Sciences, 2006, (05) : 1249 - 1252
  • [24] A fair non-repudiation protocol
    Zhou, JY
    Gollmann, D
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 55 - 61
  • [25] Non-repudiation in Ad Hoc Networks
    Tandel, Purvi
    Valiveti, Sharada
    Agrawal, K. P.
    Kotecha, K.
    [J]. COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 405 - 415
  • [26] A key authentication scheme with non-repudiation
    Hwang, Min-Shiang
    Li, Li-Hua
    Lee, Cheng-Chi
    [J]. Operating Systems Review (ACM), 2004, 38 (03): : 75 - 78
  • [27] Automatic Analysis of a Non-Repudiation Protocol
    Lanotte, Ruggero
    Maggiolo-Schettini, Andrea
    Troina, Angelo
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 113 - 129
  • [28] Non-repudiation in SET: Open issues
    Van Herreweghen, E
    [J]. FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2001, 1962 : 140 - 156
  • [29] A mutual non-repudiation protocol with privacy
    Jiang Xiao-ning
    Ye Cheng-qing
    [J]. Journal of Zhejiang University-SCIENCE A, 2000, 1 (3): : 317 - 321
  • [30] Non-repudiation protocols for multiple entities
    Onieva, JA
    Zhou, JY
    Lopez, J
    [J]. COMPUTER COMMUNICATIONS, 2004, 27 (16) : 1608 - 1616