An improved non-repudiation protocol and its security analysis

被引:0
|
作者
Li, Li
Zhang, Huan-Guo
Wang, Li-Na
机构
[1] Sch. of Computer, Wuhan Univ., Wuhan 430072, China
[2] Lab. of Software Engineering, Wuhan Univ., Wuhan 430072, China
关键词
1. School of Computer; Wuhan University; Wuhan; 430072; Hubei; China; 2. State Key Laboratory of Software Engineering; China Abstract: This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol; it also proposes an extension os Kailar logic. Using the extended Kailar logic; the security analysis of the improved protocol has been presented. Key words: non-repudiation protocol; extended Kailar logic; converse assumption procedure CLC number: TP 393.08 Received date: 2003-05-20 Foundation item: Supported by the National Natural Science Foundation o{ China (90104005) and the Doctoral Science Foundation of Ministry of Education (20020486046) Biography: Li Li(1976-); female; Ph. D candidate; research direction: network security and formal analysis of security protocol. E-mail : joie_li@ hotmail; com 1 To whom corresponding should be addressed;
D O I
暂无
中图分类号
学科分类号
摘要
7
引用
收藏
页码:288 / 292
相关论文
共 50 条
  • [1] An Improved Non-Repudiation Protocol and Its Security Analysis
    Li Li 1
    2.State Key Laboratory of Software Engineering
    Wuhan University Journal of Natural Sciences, 2004, (03) : 288 - 292
  • [2] Automatic Analysis of a Non-Repudiation Protocol
    Lanotte, Ruggero
    Maggiolo-Schettini, Andrea
    Troina, Angelo
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 113 - 129
  • [3] Fair non-repudiation protocol and its formal analysis
    Liu, Jing
    Zhou, Ming-Tian
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2003, 31 (09): : 1422 - 1425
  • [4] Optimistic non-repudiation protocol analysis
    Santiago, Judson
    Vigneron, Laurent
    INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 90 - +
  • [5] Formal analysis of a non-repudiation protocol
    Schneider, S
    11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 54 - 65
  • [6] An efficient non-repudiation protocol
    Zhou, JY
    Gollmann, D
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 126 - 132
  • [7] A fair non-repudiation protocol
    Meng, B
    Wang, SM
    Xiong, QX
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON CSCW IN DESIGN, 2002, : 68 - 73
  • [8] Formal analysis of non-repudiation protocol by spi
    Li, Yuan
    Jiang, Jian-Guo
    Wang, Huan-Bao
    Tongxin Xuebao/Journal on Communications, 2009, 30 (05): : 94 - 98
  • [9] A Fair Non-Repudiation Protocol
    Meng, B. (mengbo@263.net.cn), FAPERJ; SBC; UFRI; IEEE; COPPETEC FUNDACAO (Institute of Electrical and Electronics Engineers Inc.):
  • [10] Non-repudiation protocol for E-mail and its formal analysis
    Peng, Hongyan
    Li, Xiaojian
    Xia, Chunhe
    Deng, Jianfeng
    Zhou, Xiaofa
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006, 43 (11): : 1914 - 1919