Non-repudiation protocol for E-mail and its formal analysis

被引:0
|
作者
Peng, Hongyan [1 ]
Li, Xiaojian [2 ]
Xia, Chunhe [2 ]
Deng, Jianfeng [1 ]
Zhou, Xiaofa [1 ]
机构
[1] Networks Center, Guangxi Normal University, Guilin 541004, China
[2] Key Laboratory of Beijing Network, School of Computer Science and Engineering, Beihang University, Beijing 100083, China
关键词
Cryptography - Data communication systems - Formal logic - Network protocols - Security of data;
D O I
10.1360/crad20061108
中图分类号
学科分类号
摘要
There are different goals in a non-repudiation protocol to be considered for different application. However, there are some goals to be considered in a non-repudiation protocol for E-mail: non-repudiation of both parties; fairness to both message sender and message receiver with respective to their control over the completion of a transaction; the degree of trust on a third party; keeping E-mail confidentiality; and decreasing the number of interaction. In this paper, a new non-repudiation protocol for E-mail is proposed for resolving the existent problems: unfairness, confidentiality not well protected, and many numbers of interaction by using formal analysis, and the new protocol is proven to be able to provide non-repudiation of sender and receiver, fairness and validity of evidence.
引用
收藏
页码:1914 / 1919
相关论文
共 50 条
  • [31] A formal analysis of non-repudiation protocols based on first-order logic
    Yudan, Fan
    Jihong, Han
    Yadi, Wang
    Yu, Zhao
    Kai, Liao
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 6580 - 6583
  • [32] Non-repudiation Services for the MMS Protocol of IEC 61850
    Ruland, Karl Christoph
    Sassmannshausen, Jochen
    SECURITY STANDARDISATION RESEARCH, SSR 2015, 2015, 9497 : 70 - 85
  • [33] The Analysis and Improvement of the Certified E-Mail Protocol
    Ye, Junyao
    Wang, Yinglian
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1305 - 1308
  • [34] Analysis and improvement of a certified e-mail protocol
    Gao, Yue-Xiang
    Peng, Dai-Yuan
    Yan, Li-Li
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2013, 42 (02): : 300 - 305
  • [35] Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking
    Saha, Indranil
    Mukhopadhyay, Debapriyay
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 292 - +
  • [36] Fairness analysis of extra-gain guilty of a non-repudiation protocol
    Guo, Xu
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2022, 23 (06) : 893 - 908
  • [37] Computationally sound mechanized proof for a non-repudiation protocol
    Feng, Chao
    Chen, Yue-Bing
    Zhang, Quan
    Tang, Chao-Jing
    Tongxin Xuebao/Journal on Communications, 2011, 32 (03): : 18 - 26
  • [38] A certified e-mail protocol
    Schneier, B
    Riordan, J
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 347 - 352
  • [39] Implement Authentication and Non-Repudiation on RTP protocol for VoIP
    Koo, Tung-Ming
    Shih, Tien-Teng
    PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2011, 10 : 335 - 344
  • [40] A securely fair non-repudiation protocol with TTP load lightly
    Meng, B
    Xiong, QX
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : A13 - A17