An improved non-repudiation protocol and its security analysis

被引:0
|
作者
Li, Li
Zhang, Huan-Guo
Wang, Li-Na
机构
[1] Sch. of Computer, Wuhan Univ., Wuhan 430072, China
[2] Lab. of Software Engineering, Wuhan Univ., Wuhan 430072, China
关键词
1. School of Computer; Wuhan University; Wuhan; 430072; Hubei; China; 2. State Key Laboratory of Software Engineering; China Abstract: This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol; it also proposes an extension os Kailar logic. Using the extended Kailar logic; the security analysis of the improved protocol has been presented. Key words: non-repudiation protocol; extended Kailar logic; converse assumption procedure CLC number: TP 393.08 Received date: 2003-05-20 Foundation item: Supported by the National Natural Science Foundation o{ China (90104005) and the Doctoral Science Foundation of Ministry of Education (20020486046) Biography: Li Li(1976-); female; Ph. D candidate; research direction: network security and formal analysis of security protocol. E-mail : joie_li@ hotmail; com 1 To whom corresponding should be addressed;
D O I
暂无
中图分类号
学科分类号
摘要
7
引用
收藏
页码:288 / 292
相关论文
共 50 条
  • [41] A Security Framework with Strong Non-repudiation and Privacy in VANETs
    Choi, Jaeduck
    Jung, Souhwan
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 835 - 839
  • [42] A proof of non-repudiation
    Bella, G
    Paulson, LC
    SECURITY PROTOCOLS, 2002, 2467 : 119 - 125
  • [43] A formal analysis of CORBA non-repudiation
    Zheng, H
    Song, GX
    International Conference on Computing, Communications and Control Technologies, Vol 6, Post-Conference Issue, Proceedings, 2004, : 401 - 405
  • [44] Implement Authentication and Non-Repudiation on RTP protocol for VoIP
    Koo, Tung-Ming
    Shih, Tien-Teng
    PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2011, 10 : 335 - 344
  • [45] Evidence and non-repudiation
    National University, Singapore, Singapore
    不详
    J Network Comput Appl, 3 (267-281):
  • [46] A securely fair non-repudiation protocol with TTP load lightly
    Meng, B
    Xiong, QX
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : A13 - A17
  • [47] On the formal analyses of the Zhou-Gollmann non-repudiation protocol
    Pancho-Festin, S
    Gollmann, D
    FORMAL ASPECTS IN SECURITY AND TRUST, 2006, 3866 : 5 - 15
  • [48] Observations on non-repudiation
    Lect Notes Comput Sci, (133):
  • [49] Analysis and improvement of ZG off-line TTP non-repudiation protocol
    Liu, Dong-Mei
    Qing, Si-Han
    Li, Peng-Fei
    Li, Shang-Jie
    Tongxin Xuebao/Journal on Communications, 2009, 30 (11 A): : 44 - 51
  • [50] An alternative version of HTTPS to provide non-repudiation security property
    Resondry, Stassia
    Boudaoud, Karima
    Kamel, Michel
    Bertrand, Yoann
    Riveill, Michel
    2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 536 - 541