Securing digital signatures for non-repudiation

被引:29
|
作者
Zhou, J
Lam, KY
机构
[1] Kent Ridge Digital Labs, Singapore 119613, Singapore
[2] Natl Univ Singapore, Sch Comp, Singapore 119260, Singapore
关键词
digital signature; non-repudiation; secure electronic commerce;
D O I
10.1016/S0140-3664(99)00031-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dispute of transactions is a common problem that could jeopardise business. Hence non-repudiation services are essential in business transactions which provide evidence to enable dispute resolution. To be eligible as non-repudiation evidence, the digital signature on an electronic document should remain valid until its expiry date which is specified by some non-repudiation policy. The conventional approaches are either inefficient or insecure to achieve non-repudiation in electronic commerce. This article presents a practical scheme to secure digital signatures as non-repudiation evidence with an adjustable degree of risk. (C) 1999 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:710 / 716
页数:7
相关论文
共 50 条
  • [1] Strong non-repudiation based on certificateless short signatures
    Chen, Yu-Chi
    Horng, Gwoboa
    Liu, Chao-Liang
    [J]. IET INFORMATION SECURITY, 2013, 7 (03) : 253 - 263
  • [2] Evidence and non-repudiation
    Zhou, JY
    Gollmann, D
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 1997, 20 (03) : 267 - 281
  • [3] NON-REPUDIATION - CONSTITUTING EVIDENCE AND PROOF IN DIGITAL COOPERATION
    HERDA, S
    [J]. COMPUTER STANDARDS & INTERFACES, 1995, 17 (01) : 69 - 79
  • [4] A proof of non-repudiation
    Bella, G
    Paulson, LC
    [J]. SECURITY PROTOCOLS, 2002, 2467 : 119 - 125
  • [5] SM9 Digital Signature with Non-repudiation
    Wang, Meng
    Long, Yihong
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2020), 2020, : 356 - 361
  • [6] Fair non-repudiation in mobile communication using joint signatures
    Tiwari, RK
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 438 - 440
  • [7] An efficient non-repudiation protocol
    Zhou, JY
    Gollmann, D
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 126 - 132
  • [8] A fair non-repudiation protocol
    Meng, B
    Wang, SM
    Xiong, QX
    [J]. PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON CSCW IN DESIGN, 2002, : 68 - 73
  • [9] Non-repudiation Analysis with LYSA
    Bruso, Mayla
    Cortesi, Agostino
    [J]. EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST, 2009, 297 : 318 - 329
  • [10] Achieving non-repudiation of receipt
    Zhang, N
    Shi, Q
    [J]. COMPUTER JOURNAL, 1996, 39 (10): : 844 - 853