2005
DOI: 10.1007/s10207-004-0063-7
|View full text |Cite
|
Sign up to set email alerts
|

On the security of fair non-repudiation protocols

Abstract: We analyzed two non-repudiation protocols and found some new attacks on the fairness and termination property of these protocols. Our attacks are enabled by several inherent design weaknesses, which also apply to other non-repudiation protocols. To prevent these attacks, we propose generic countermeasures that considerably strengthen the design and implementation of non-repudiation protocols. The application of these countermeasures is finally shown by our construction of a new fair non-repudiation protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
55
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 33 publications
(61 citation statements)
references
References 25 publications
(44 reference statements)
1
55
0
Order By: Relevance
“…We have chosen this protocol as a case study to demonstrate our analysis approach because of the existence of significant related work [4,10,21,25]. The protocol is presented below in Alice&Bob notation, where fNRO, fNRR, fSUB and fCON are labels used to identify the purpose of messages.…”
Section: Running Example: the Fairzg Protocolmentioning
confidence: 99%
See 3 more Smart Citations
“…We have chosen this protocol as a case study to demonstrate our analysis approach because of the existence of significant related work [4,10,21,25]. The protocol is presented below in Alice&Bob notation, where fNRO, fNRR, fSUB and fCON are labels used to identify the purpose of messages.…”
Section: Running Example: the Fairzg Protocolmentioning
confidence: 99%
“…In order to avoid this kind of problems we need to prove that Bob could only own N RO if Alice has actually sent the correct protocol messages. This may be done as for example in [25], [27] or [10] but this is not trivial. 2.…”
Section: Limitations and Difficultiesmentioning
confidence: 99%
See 2 more Smart Citations
“…Ever since then, subsequent efforts in this approach resulted in efficient and fair protocols (Asokan et al [3], S. Kremer and O. Markowitch [14], we call them as AK protocol) that can guarantee that both parties can terminate the protocol timely while assuring fairness (called property of timeliness). Although they were attacked for some designing details (see [12]), their messages & rounds optimality (see [23] for detailed discussions) and basic building blocks (main protocol, resolve and abort sub-protocols) are well analyzed and widely accepted.…”
Section: Related Workmentioning
confidence: 99%