Analysis and improvement of ZG off-line TTP non-repudiation protocol

被引:0
|
作者
Liu, Dong-Mei [1 ,3 ]
Qing, Si-Han [2 ]
Li, Peng-Fei [4 ]
Li, Shang-Jie [1 ,3 ]
机构
[1] National Engineering Research Center for Fundamental Software, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
[2] Engineering Research Center for Information Security Technology, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
[3] Graduate School, Chinese Academy of Sciences, Beijing 100039, China
[4] National Key Laboratory of Integrated Information System Technology, Chinese Academy of Sciences, Beijing 100080, China
来源
Tongxin Xuebao/Journal on Communications | 2009年 / 30卷 / 11 A期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:44 / 51
相关论文
共 50 条
  • [41] How to protect exchanged secrets in the fair exchange protocol with off-line TTP
    Wang, Chih-Hung
    Yin, Chih-Heng
    Juan, Chieh-His
    COMPUTERS & ELECTRICAL ENGINEERING, 2006, 32 (05) : 364 - 375
  • [42] Atomic and anonymous e-Cash transaction protocol with off-line TTP
    王茜
    李朝阳
    杨德礼
    Journal of Harbin Institute of Technology, 2004, (05) : 558 - 563
  • [43] On the formal analyses of the Zhou-Gollmann non-repudiation protocol
    Pancho-Festin, S
    Gollmann, D
    FORMAL ASPECTS IN SECURITY AND TRUST, 2006, 3866 : 5 - 15
  • [44] Fair Security Protocols with off-line TTP
    Wang, Xi
    Wen, Xiangming
    Liang, Changxin
    Liu, Ye
    Lin, Xinqi
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT UBIQUITOUS COMPUTING AND EDUCATION, 2009, : 109 - +
  • [45] A non-repudiation message transfer protocol for e-commerce
    Yang, S
    Su, SYW
    Lam, H
    IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, : 320 - 327
  • [46] Performance of an enhanced GSM protocol supporting non-repudiation of service
    Stach, JF
    Park, EK
    Makki, K
    COMPUTER COMMUNICATIONS, 1999, 22 (07) : 675 - 680
  • [47] Establishing and Preventing a New Replay Attack on a Non-Repudiation Protocol
    Muntean, Carla
    Dojen, Reiner
    Coffey, Tom
    2009 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2009, : 283 - 290
  • [48] Non-repudiation analysis using LYSA with annotations
    Bruso, Mayla
    Cortesi, Agostino
    COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2010, 36 (04) : 352 - 377
  • [49] An efficient quantum mechanism based fair non-repudiation protocol
    Zhang Weichao
    Xiong, Yan
    Wang Xingfu
    Miao Fuyou
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (01): : 170 - 172
  • [50] AN AUTHENTICATION PROTOCOL WITH BILLING NON-REPUDIATION TO PERSONAL COMMUNICATION SYSTEMS
    Chen, Tzung-Her
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (09): : 2657 - 2664