Non-repudiation protocol for E-mail and its formal analysis

被引:0
|
作者
Peng, Hongyan [1 ]
Li, Xiaojian [2 ]
Xia, Chunhe [2 ]
Deng, Jianfeng [1 ]
Zhou, Xiaofa [1 ]
机构
[1] Networks Center, Guangxi Normal University, Guilin 541004, China
[2] Key Laboratory of Beijing Network, School of Computer Science and Engineering, Beihang University, Beijing 100083, China
关键词
Cryptography - Data communication systems - Formal logic - Network protocols - Security of data;
D O I
10.1360/crad20061108
中图分类号
学科分类号
摘要
There are different goals in a non-repudiation protocol to be considered for different application. However, there are some goals to be considered in a non-repudiation protocol for E-mail: non-repudiation of both parties; fairness to both message sender and message receiver with respective to their control over the completion of a transaction; the degree of trust on a third party; keeping E-mail confidentiality; and decreasing the number of interaction. In this paper, a new non-repudiation protocol for E-mail is proposed for resolving the existent problems: unfairness, confidentiality not well protected, and many numbers of interaction by using formal analysis, and the new protocol is proven to be able to provide non-repudiation of sender and receiver, fairness and validity of evidence.
引用
收藏
页码:1914 / 1919
相关论文
共 50 条
  • [1] A Non-repudiation E-mail Transmission Protocol and Its Formal Analysis
    Ren, Zeming
    Xu, Lingyun
    Liu, Qian
    Fan, Andong
    PROGRESS IN MECHATRONICS AND INFORMATION TECHNOLOGY, PTS 1 AND 2, 2014, 462-463 : 984 - 988
  • [2] Fair non-repudiation protocol and its formal analysis
    Liu, Jing
    Zhou, Ming-Tian
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2003, 31 (09): : 1422 - 1425
  • [3] Formal analysis of a non-repudiation protocol
    Schneider, S
    11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 54 - 65
  • [4] Formal analysis of non-repudiation protocol by spi
    Li, Yuan
    Jiang, Jian-Guo
    Wang, Huan-Bao
    Tongxin Xuebao/Journal on Communications, 2009, 30 (05): : 94 - 98
  • [5] Fair non-repudiation cryptographic protocol and its formal analysis and applications
    Lin, X.X. (lixx@cscw.buaa.edu.cn), 1628, Chinese Academy of Sciences (11):
  • [6] An Improved Non-Repudiation Protocol and Its Security Analysis
    Li Li 1
    2.State Key Laboratory of Software Engineering
    Wuhan University Journal of Natural Sciences, 2004, (03) : 288 - 292
  • [7] An improved non-repudiation protocol and its security analysis
    Li, Li
    Zhang, Huan-Guo
    Wang, Li-Na
    Wuhan University Journal of Natural Sciences, 2004, 9 (03) : 288 - 292
  • [8] A formal analysis of CORBA non-repudiation
    Zheng, H
    Song, GX
    International Conference on Computing, Communications and Control Technologies, Vol 6, Post-Conference Issue, Proceedings, 2004, : 401 - 405
  • [9] Automatic Analysis of a Non-Repudiation Protocol
    Lanotte, Ruggero
    Maggiolo-Schettini, Andrea
    Troina, Angelo
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 113 - 129
  • [10] Formal Analysis and Improvement of Multi-party Non-repudiation Protocol
    Wang, Xueming
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4120 - 4123