Securing digital signatures for non-repudiation

被引:29
|
作者
Zhou, J
Lam, KY
机构
[1] Kent Ridge Digital Labs, Singapore 119613, Singapore
[2] Natl Univ Singapore, Sch Comp, Singapore 119260, Singapore
关键词
digital signature; non-repudiation; secure electronic commerce;
D O I
10.1016/S0140-3664(99)00031-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dispute of transactions is a common problem that could jeopardise business. Hence non-repudiation services are essential in business transactions which provide evidence to enable dispute resolution. To be eligible as non-repudiation evidence, the digital signature on an electronic document should remain valid until its expiry date which is specified by some non-repudiation policy. The conventional approaches are either inefficient or insecure to achieve non-repudiation in electronic commerce. This article presents a practical scheme to secure digital signatures as non-repudiation evidence with an adjustable degree of risk. (C) 1999 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:710 / 716
页数:7
相关论文
共 50 条
  • [31] On the security of fair non-repudiation protocols
    Gürgens S.
    Rudolph C.
    Vogt H.
    [J]. International Journal of Information Security, 2005, 4 (4) : 253 - 262
  • [32] Improvement of a fair non-repudiation protocol
    Wen, Jinghua
    Liang, Min
    Yang, Zirong
    Li, Xiang
    [J]. PROCEEDINGS OF E-ENGDET2006, 2006, : 70 - 74
  • [33] Evolution of fair non-repudiation with TTP
    Zhou, JY
    Deng, R
    Bao, F
    [J]. INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 258 - 269
  • [34] A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY
    蒋晓宁
    叶澄清
    [J]. Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2000, (03) : 80 - 84
  • [35] A formal treatment of non-repudiation protocols
    Hada, S
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (02) : 461 - 470
  • [36] Formal analysis of a non-repudiation protocol
    Schneider, S
    [J]. 11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 54 - 65
  • [37] On the security of fair non-repudiation protocols
    Gürgens, S
    Rudolph, C
    Vogt, H
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 193 - 207
  • [38] A proof of non-repudiation - (Transcript of discussion)
    Paulson, L
    [J]. SECURITY PROTOCOLS, 2002, 2467 : 126 - 133
  • [39] Automated Design of Non-repudiation Security Protocols
    Xue, Haifeng
    Zhang, Huanguo
    Qing, Sihan
    Yu, Rongwei
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2318 - +
  • [40] Digital signature scheme for information non-repudiation in blockchain: a state of the art review
    Fang, Weidong
    Chen, Wei
    Zhang, Wuxiong
    Pei, Jun
    Gao, Weiwei
    Wang, Guohui
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)