2003
DOI: 10.1007/10958513_15
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of Fair Non-repudiation Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2004
2004
2006
2006

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…When implementing the protocol, we follow the principles proposed by Gurgens et al [12] as briefly described below:…”
Section: The Dependable Payment Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…When implementing the protocol, we follow the principles proposed by Gurgens et al [12] as briefly described below:…”
Section: The Dependable Payment Protocolmentioning
confidence: 99%
“…Also we argue that the transparent TTP will not affect the observability of our protocol. When implementing the protocols, we incorporate the label and message construction design principles proposed by Gurgens et al [12]. When using offline TTP, the problem of encrypted item validation arises and we propose two methods considering different application scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, if the receiver Bob denies having received a specific message from Alice, Alice can provide the publicly verifiable receipt to an arbitrator to show that this claim is untrue. Similar security services are provided by non-repudiation protocols [8], [15].…”
Section: Introductionmentioning
confidence: 99%
“…But those schemes are not optimized to reduce the number of asymmetric cryptographic operations that are required to complete a message delivery. Actually, most of those schemes [4], [10], [8], [12] need ten or more modular exponentiations, the most expensive operations in cryptography. The other two schemes proposed in [9], [11] are relatively simple, but they are vulnerable to an attack that allows the sender to cheat the receiver by mixing identities of different TTPs [15].…”
Section: Introductionmentioning
confidence: 99%