A kind of analysis method of off-line TTP fair non-repudiation protocol

被引:0
|
作者
Liu, Dongmei [1 ,3 ]
Qing, Sihan [1 ,2 ]
Ma, Hengtai [4 ]
Li, Shuren [5 ]
机构
[1] National Engineering Research Center for Fundamental Software, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
[2] School of Software and Microelectronics, Peking University, Beijing 102600, China
[3] Graduate University of Chinese Academy of Sciences, Beijing 100049, China
[4] National Key Laboratory of Integrated Information System Technology, Chinese Academy of Science, Beijing 100190, China
[5] Computer Network Information Center, Chinese Academy of Sciences, Beijing 100190, China
关键词
13;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:656 / 665
相关论文
共 50 条
  • [32] An Improved Non-Repudiation Protocol and Its Security Analysis
    Li Li 1
    2.State Key Laboratory of Software Engineering
    Wuhan University Journal of Natural Sciences, 2004, (03) : 288 - 292
  • [33] An improved non-repudiation protocol and its security analysis
    Li, Li
    Zhang, Huan-Guo
    Wang, Li-Na
    Wuhan University Journal of Natural Sciences, 2004, 9 (03) : 288 - 292
  • [34] An intensive survey of fair non-repudiation protocols
    Kremer, S
    Markowitch, O
    Zhou, JY
    COMPUTER COMMUNICATIONS, 2002, 25 (17) : 1606 - 1621
  • [35] A mutual non-repudiation protocol with privacy
    Jiang Xiao-ning
    Ye Cheng-qing
    Journal of Zhejiang University-SCIENCE A, 2000, 1 (3): : 317 - 321
  • [36] Untraceable fair network payment protocols with off-line TTP
    Wang, CH
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 173 - 187
  • [37] Efficient and practical fair exchange protocols with off-line TTP
    Bao, F
    Deng, RH
    Mao, WB
    1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 77 - 85
  • [38] The design and analysis of an electronic evidence and non-repudiation protocol
    Yuan, D
    Guo, T
    Fan, PZ
    ISADS 2005: International Symposium on Autonomous Decentralized Systems,Proceedings, 2005, : 570 - 573
  • [39] Security analysis of (un-) fair non-repudiation protocols
    Gürgens, S
    Rudolph, C
    FORMAL ASPECTS OF SECURITY, 2003, 2629 : 97 - 114
  • [40] A non-repudiation fair exchange protocol with semi-trusted third party
    2001, Huazhong University of Science and Technology (29):