An improved non-repudiation protocol and its security analysis

被引:0
|
作者
Li, Li
Zhang, Huan-Guo
Wang, Li-Na
机构
[1] Sch. of Computer, Wuhan Univ., Wuhan 430072, China
[2] Lab. of Software Engineering, Wuhan Univ., Wuhan 430072, China
关键词
1. School of Computer; Wuhan University; Wuhan; 430072; Hubei; China; 2. State Key Laboratory of Software Engineering; China Abstract: This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol; it also proposes an extension os Kailar logic. Using the extended Kailar logic; the security analysis of the improved protocol has been presented. Key words: non-repudiation protocol; extended Kailar logic; converse assumption procedure CLC number: TP 393.08 Received date: 2003-05-20 Foundation item: Supported by the National Natural Science Foundation o{ China (90104005) and the Doctoral Science Foundation of Ministry of Education (20020486046) Biography: Li Li(1976-); female; Ph. D candidate; research direction: network security and formal analysis of security protocol. E-mail : joie_li@ hotmail; com 1 To whom corresponding should be addressed;
D O I
暂无
中图分类号
学科分类号
摘要
7
引用
收藏
页码:288 / 292
相关论文
共 50 条
  • [31] A new security service non-repudiation of mutual agreement
    Putz, S
    COMMUNICATIONS AND MULTIMEDIA SECURITY, VOL 3, 1997, : 203 - 212
  • [32] Non-repudiation Services for the MMS Protocol of IEC 61850
    Ruland, Karl Christoph
    Sassmannshausen, Jochen
    SECURITY STANDARDISATION RESEARCH, SSR 2015, 2015, 9497 : 70 - 85
  • [33] Continuous Authentication and Non-repudiation for the Security of Critical Systems
    Schiavone, Enrico
    Ceccarelli, Andrea
    Bondavalli, Andrea
    PROCEEDINGS OF 2016 IEEE 35TH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2016, : 207 - 208
  • [34] Evidence and non-repudiation
    Zhou, JY
    Gollmann, D
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 1997, 20 (03) : 267 - 281
  • [35] Formal Analysis and Improvement of Multi-party Non-repudiation Protocol
    Wang, Xueming
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4120 - 4123
  • [36] Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking
    Saha, Indranil
    Mukhopadhyay, Debapriyay
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 292 - +
  • [37] A formal analysis of fairness and non-repudiation in the RSA-CEGD protocol
    Alcaide, A
    Estévez-Tapiador, JM
    Izquierdo, A
    Sierra, JM
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, VOL 4, PROCEEDINGS, 2005, 3483 : 1309 - 1318
  • [38] Fairness analysis of extra-gain guilty of a non-repudiation protocol
    Guo, Xu
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2022, 23 (06) : 893 - 908
  • [39] Improved public key authentication scheme for non-repudiation
    Sun, DZ
    Cao, ZF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 927 - 932
  • [40] Computationally sound mechanized proof for a non-repudiation protocol
    Feng, Chao
    Chen, Yue-Bing
    Zhang, Quan
    Tang, Chao-Jing
    Tongxin Xuebao/Journal on Communications, 2011, 32 (03): : 18 - 26