An improved non-repudiation protocol and its security analysis

被引:0
|
作者
Li, Li
Zhang, Huan-Guo
Wang, Li-Na
机构
[1] Sch. of Computer, Wuhan Univ., Wuhan 430072, China
[2] Lab. of Software Engineering, Wuhan Univ., Wuhan 430072, China
关键词
1. School of Computer; Wuhan University; Wuhan; 430072; Hubei; China; 2. State Key Laboratory of Software Engineering; China Abstract: This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol; it also proposes an extension os Kailar logic. Using the extended Kailar logic; the security analysis of the improved protocol has been presented. Key words: non-repudiation protocol; extended Kailar logic; converse assumption procedure CLC number: TP 393.08 Received date: 2003-05-20 Foundation item: Supported by the National Natural Science Foundation o{ China (90104005) and the Doctoral Science Foundation of Ministry of Education (20020486046) Biography: Li Li(1976-); female; Ph. D candidate; research direction: network security and formal analysis of security protocol. E-mail : joie_li@ hotmail; com 1 To whom corresponding should be addressed;
D O I
暂无
中图分类号
学科分类号
摘要
7
引用
收藏
页码:288 / 292
相关论文
共 50 条
  • [21] On the quest for impartiality: Design and analysis of a fair non-repudiation protocol
    Cederquist, J
    Corin, R
    Dashti, MT
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 27 - 39
  • [22] Automated Design of Non-repudiation Security Protocols
    Xue, Haifeng
    Zhang, Huanguo
    Qing, Sihan
    Yu, Rongwei
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2318 - +
  • [23] Non-repudiation Analysis with LYSA
    Bruso, Mayla
    Cortesi, Agostino
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST, 2009, 297 : 318 - 329
  • [24] Security analysis of (un-) fair non-repudiation protocols
    Gürgens, S
    Rudolph, C
    FORMAL ASPECTS OF SECURITY, 2003, 2629 : 97 - 114
  • [25] A multi-party non-repudiation protocol
    Kremer, S
    Markowitch, O
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 271 - 280
  • [26] A quantum fair non-repudiation protocol with QTTP
    Xiong Yan
    Zhang Weichao
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (01): : 30 - 33
  • [27] Biometrics for non-repudiation: security and legal aspect
    Lagou, Panagiota
    Chondrokoukis, Gregory P.
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2011, 3 (02) : 128 - 147
  • [28] Modeling Adaptive Non-Repudiation Security Services
    Tunia, Marcin A.
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2016, 2016, 10031
  • [29] Security analysis of efficient (Un-) fair non-repudiation protocols
    Gürgens, S
    Rudolph, C
    FORMAL ASPECTS OF COMPUTING, 2005, 17 (03) : 260 - 276
  • [30] A quantum fair non-repudiation protocol with QTTP
    Department of Computer Science, University of Science and Technology of China, Hefei 230027, China
    Chin J Electron, 2007, 1 (30-33):