Abstract
Non-repudiation turns out to be an increasingly important security service with the fast growth of electronic commerce on the Internet. Non-repudiation services protect the transacting parties against any false denial that a particular event or action has taken place, in which evidence will be generated, collected and maintained to enable dispute resolution. Meanwhile, fairness is a further desirable requirement such that neither party can gain an advantage by quitting prematurely or otherwise misbehaving during a transaction. In this paper, we survey the evolution of techniques and protocols that had been put forward to achieve fair non-repudiation with a (trusted) third party, and present a secure and efficient fair non-repudiation protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
N. Asokan, M. Schunter and M. Waidner. Optimistic protocols for fair exchange. Proceedings of 4th ACM Conference on Computer and Communications Security, pages 7–17, Zurich, Switzerland, April 1997.
N. Asokan, V. Shoup and M. Waidner. Asynchronous protocols for optimistic fair exchange. Proceedings of 1998 IEEE Symposium on Security and Privacy, pages 86–99, Oakland, California, May 1998.
A. Bahreman and J. D. Tygar. Certified electronic mail. Proceedings of the Internet Society Symposium on Network and Distributed System Security, pages 3–19, San Diego, California, February 1994.
F. Bao, R. H. Deng and W. Mao. Efficient and practical fair exchange protocols with off-line TTP. Proceedings of 1998 IEEE Symposium on Security and Privacy, pages 77–85, Oakland, California, May 1998.
M. Ben-Or, O. Goldreich, S. Micali and R. Rivest. A fair protocol for signing contracts. IEEE Transactions on Information Theory, IT-36(1):40–46, January 1990.
E. F. Brickell, D. Chaum, I. B. Damgard and J. van de Graaf. Gradual and verifiable release of a secret. Lecture Notes in Computer Science 293, Advances in Cryptology: Proceedings of Crypto’87, pages 156–166, Santa Barbara, California, August 1987.
CCITT. Recommendation X.509: The directory-Authentication framework. November 1988.
R. Cleve. Controlled gradual disclosure schemes for random bits and their applications. Lecture Notes in Computer Science 435, Advances in Cryptology: Proceedings of Crypto’89, pages 573–588, Santa Barbara, California, August 1989.
T. Coffey and P. Saidha. Non-repudiation with mandatory proof of receipt. Computer Communication Review, 26(1):6–17, January 1996.
B. Cox, J. D. Tygar and M. Sirbu. NetBill security and transaction protocol. Proceedings of the First USENIX Workshop on Electronic Commerce, pages 77–88, July 1995.
I. B. Damgard. Practical and provably secure release of a secret and exchange of signatures. Lecture Notes in Computer Science 765, Advances in Cryptology: Proceedings of Eurocrypt’93, pages 200–217, Lofthus, Norway, May 1993.
R. H. Deng, L. Gong, A. A. Lazar and W. Wang. Practical protocols for certified electronic mail. Journal of Network and Systems Management, 4(3):279–297, 1996.
M. Franklin and M. Reiter. Fair exchange with a semi-trusted third party. Proceedings of 4th ACM Conference on Computer and Communications Security, pages 1–6, Zurich, Switzerland, April 1997.
ISO/IEC 13888-1. Information technology-Security techniques-Non-repudiation-Part 1: General. ISO/IEC, 1997.
ISO/IEC 13888-2. Information technology-Security techniques-Non-repudiation-Part 2: Mechanisms using symmetric techniques. ISO/IEC, 1998.
ISO/IEC 13888-3. Information technology-Security techniques-Non-repudiation-Part 3: Mechanisms using asymmetric techniques. ISO/IEC, 1997.
T. Okamoto and K. Ohta. How to simultaneously exchange secrets by general assumptions. Proceedings of 2nd ACM Conference on Computer and Communications Security, pages 184–192, Fairfax, Virginia, November 1994.
J. B. Postel and J. K. Reynolds. File transfer protocol. RFC 959, October 1985.
N. Zhang and Q. Shi. Achieving non-repudiation of receipt. The Computer Journal, 39(10):844–853, 1996.
J. Zhou and D. Gollmann. A fair non-repudiation protocol. Proceedings of 1996 IEEE Symposium on Security and Privacy, pages 55–61, Oakland, California, May 1996.
J. Zhou. Non-repudiation. PhD Thesis, University of London, December 1996.
J. Zhou and D. Gollmann. An efficient non-repudiation protocol. Proceedings of 10th IEEE Computer Security Foundations Workshop, pages 126–132, Rockport, Massachusetts, June 1997.
J. Zhou, R. H. Deng and F. Bao. Some remarks on a fair exchange protocol. (manuscript)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhou, J., Deng, R., Bao, F. (1999). Evolution of Fair Non-repudiation with TTP. In: Pieprzyk, J., Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 1999. Lecture Notes in Computer Science, vol 1587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48970-3_21
Download citation
DOI: https://doi.org/10.1007/3-540-48970-3_21
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65756-9
Online ISBN: 978-3-540-48970-2
eBook Packages: Springer Book Archive