Non-repudiation protocol for E-mail and its formal analysis

被引:0
|
作者
Peng, Hongyan [1 ]
Li, Xiaojian [2 ]
Xia, Chunhe [2 ]
Deng, Jianfeng [1 ]
Zhou, Xiaofa [1 ]
机构
[1] Networks Center, Guangxi Normal University, Guilin 541004, China
[2] Key Laboratory of Beijing Network, School of Computer Science and Engineering, Beihang University, Beijing 100083, China
关键词
Cryptography - Data communication systems - Formal logic - Network protocols - Security of data;
D O I
10.1360/crad20061108
中图分类号
学科分类号
摘要
There are different goals in a non-repudiation protocol to be considered for different application. However, there are some goals to be considered in a non-repudiation protocol for E-mail: non-repudiation of both parties; fairness to both message sender and message receiver with respective to their control over the completion of a transaction; the degree of trust on a third party; keeping E-mail confidentiality; and decreasing the number of interaction. In this paper, a new non-repudiation protocol for E-mail is proposed for resolving the existent problems: unfairness, confidentiality not well protected, and many numbers of interaction by using formal analysis, and the new protocol is proven to be able to provide non-repudiation of sender and receiver, fairness and validity of evidence.
引用
收藏
页码:1914 / 1919
相关论文
共 50 条
  • [41] Non-Repudiation Framework for E-Government Applications
    Peiris, Hasala
    Soysa, Lakshan
    Palliyaguru, Rohana
    2008 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION FOR SUSTAINABILITY (ICIAFS), 2008, : 177 - +
  • [42] An Optimistic Certified E-mail Protocol for the Current Internet E-mail Architecture
    Draper-Gil, Gerard
    Ferrer-Gomila, Josep L.
    Hinarejos, M. Francisca
    Tauber, Arne
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 382 - 390
  • [43] Analysis and improvement of ZG off-line TTP non-repudiation protocol
    Liu, Dong-Mei
    Qing, Si-Han
    Li, Peng-Fei
    Li, Shang-Jie
    Tongxin Xuebao/Journal on Communications, 2009, 30 (11 A): : 44 - 51
  • [44] Performance of an enhanced GSM protocol supporting non-repudiation of service
    Stach, JF
    Park, EK
    Makki, K
    COMPUTER COMMUNICATIONS, 1999, 22 (07) : 675 - 680
  • [45] Establishing and Preventing a New Replay Attack on a Non-Repudiation Protocol
    Muntean, Carla
    Dojen, Reiner
    Coffey, Tom
    2009 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2009, : 283 - 290
  • [46] Non-repudiation analysis using LYSA with annotations
    Bruso, Mayla
    Cortesi, Agostino
    COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2010, 36 (04) : 352 - 377
  • [47] An efficient quantum mechanism based fair non-repudiation protocol
    Zhang Weichao
    Xiong, Yan
    Wang Xingfu
    Miao Fuyou
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (01): : 170 - 172
  • [48] AN AUTHENTICATION PROTOCOL WITH BILLING NON-REPUDIATION TO PERSONAL COMMUNICATION SYSTEMS
    Chen, Tzung-Her
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (09): : 2657 - 2664
  • [49] An improved e-mail security protocol
    Schneier, B
    Hall, C
    13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, : 227 - 230
  • [50] Provision of Deniability in E-mail Protocol
    Kim, Hyo
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (11): : 299 - 301