Skip to main content
Top
Published in:
Cover of the book

2014 | OriginalPaper | Chapter

Keynote Talk: Communication Without Repudiation: The Unanswered Question

Author : Mohamed G. Gouda

Published in: Networked Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A non-repudiation protocol is to be executed by two parties, say \(S\) and \(R\), in order to (1) enable \(S\) to send some text to \(R\) then receive some non-repudiated evidence that \(R\) has indeed received the text, and (2) enable \(R\) to receive both the sent text from \(S\) and some non-repudiated evidence that this text was indeed sent from \(S\) to \(R\). Since 1995, tens of non-repudiation protocols have been proposed, but every one of these protocols seems to suffer from one or more well-known problems. For example, most protocols assume the existence of a third party that is trusted by both \(S\) and \(R\). This observation reminds us that the following core question has never been answered. Can there be a non-repudiation protocol that does not suffer from any of these problems?

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Herda, S.: Non-repudiation: constituting evidence and proof in digital cooperation. Comput. Stand. Interf. 17(1), 69–79 (1995)CrossRef Herda, S.: Non-repudiation: constituting evidence and proof in digital cooperation. Comput. Stand. Interf. 17(1), 69–79 (1995)CrossRef
2.
go back to reference Cox, B., Tygar, D., Sirbu, M.: NetBill security and transaction protocol. In: Proceedings of USENIX Workshop on Electronic Commerce, pp. 77–88, July 1995 Cox, B., Tygar, D., Sirbu, M.: NetBill security and transaction protocol. In: Proceedings of USENIX Workshop on Electronic Commerce, pp. 77–88, July 1995
3.
go back to reference Zhou, J., Gollmann, D.: A fair non-repudiation protocol. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 55–61, May 1996 Zhou, J., Gollmann, D.: A fair non-repudiation protocol. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 55–61, May 1996
4.
go back to reference Zhou, J., Gollmann, D.: An efficient non-repudiation protocol. In: Proceedings of the IEEE Computer Security Foundations Workshop, pp. 126–132, June 1997 Zhou, J., Gollmann, D.: An efficient non-repudiation protocol. In: Proceedings of the IEEE Computer Security Foundations Workshop, pp. 126–132, June 1997
5.
go back to reference Markowitch, O., Roggeman, Y.: Probabilistic non-repudiation without trusted third party. In: Proceedings of the Conference on Security in Communication Networks, September 1999 Markowitch, O., Roggeman, Y.: Probabilistic non-repudiation without trusted third party. In: Proceedings of the Conference on Security in Communication Networks, September 1999
6.
go back to reference Hernandez-Ardieta, J., Gonzalez-Tablas, A., Alvarez, B.: An optimistic fair exchange protocol based on signature policies. Comput. Secur. 27(7–8), 309–322 (2008)CrossRef Hernandez-Ardieta, J., Gonzalez-Tablas, A., Alvarez, B.: An optimistic fair exchange protocol based on signature policies. Comput. Secur. 27(7–8), 309–322 (2008)CrossRef
7.
go back to reference Kremer, S., Markowitch, O., Zhou, J.: An intensive survey of fair non-repudiation protocols. Comput. Commun. 25(17), 1606–1621 (2002)CrossRef Kremer, S., Markowitch, O., Zhou, J.: An intensive survey of fair non-repudiation protocols. Comput. Commun. 25(17), 1606–1621 (2002)CrossRef
8.
go back to reference Muntean, C., Dojen, R., Coffey, T.: Establishing and preventing a new replay attack on a non-repudiation protocol. In: Proceedings of the 5-th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), pp. 283–290, August 2009 Muntean, C., Dojen, R., Coffey, T.: Establishing and preventing a new replay attack on a non-repudiation protocol. In: Proceedings of the 5-th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), pp. 283–290, August 2009
9.
go back to reference Chen, M., Wu, K., Xu, J., He, P.: A new method for formalizing optimistic fair exchange protocols. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 251–265. Springer, Heidelberg (2010) CrossRef Chen, M., Wu, K., Xu, J., He, P.: A new method for formalizing optimistic fair exchange protocols. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 251–265. Springer, Heidelberg (2010) CrossRef
10.
go back to reference Kremer, S., Markowitch, O.: A multi-party non-repudiation protocol. In: Qing, S., Eloff, J.H.P. (eds.) Information Security for Global Information Infrastructures. IFIP, vol. 47, pp. 271–280. Springer, Heidelberg (2000) CrossRef Kremer, S., Markowitch, O.: A multi-party non-repudiation protocol. In: Qing, S., Eloff, J.H.P. (eds.) Information Security for Global Information Infrastructures. IFIP, vol. 47, pp. 271–280. Springer, Heidelberg (2000) CrossRef
11.
go back to reference Markowitch, O., Kremer, S.: A multi-party optimistic non-repudiation protocol. In: Won, D. (ed.) ICISC 2000. LNCS, vol. 2015, pp. 109–122. Springer, Heidelberg (2001) CrossRef Markowitch, O., Kremer, S.: A multi-party optimistic non-repudiation protocol. In: Won, D. (ed.) ICISC 2000. LNCS, vol. 2015, pp. 109–122. Springer, Heidelberg (2001) CrossRef
12.
go back to reference Zhou, J., Onieva, J., Lopez, J.: Optimized multi-party certified email protocols. Inf. Manag. Comput. Secur. 13(5), 350–366 (2005) Zhou, J., Onieva, J., Lopez, J.: Optimized multi-party certified email protocols. Inf. Manag. Comput. Secur. 13(5), 350–366 (2005)
13.
go back to reference Ferrer-Gomilla, J., Onieva, J., Payeras, M., Lopez, J.: Certified electronic mail: properties revisited. Comput. Secur. 29(2), 167–179 (2010)CrossRef Ferrer-Gomilla, J., Onieva, J., Payeras, M., Lopez, J.: Certified electronic mail: properties revisited. Comput. Secur. 29(2), 167–179 (2010)CrossRef
14.
go back to reference Oppliger, R.: Providing certified mail services on the Internet. IEEE Secur. Priv. 5(1), 16–22 (2007)CrossRef Oppliger, R.: Providing certified mail services on the Internet. IEEE Secur. Priv. 5(1), 16–22 (2007)CrossRef
15.
go back to reference Tauber, A.: A survey of certified mail systems provided on the Internet. Comput. Secur. 30(6–7), 464–485 (2011)CrossRef Tauber, A.: A survey of certified mail systems provided on the Internet. Comput. Secur. 30(6–7), 464–485 (2011)CrossRef
Metadata
Title
Keynote Talk: Communication Without Repudiation: The Unanswered Question
Author
Mohamed G. Gouda
Copyright Year
2014
DOI
https://doi.org/10.1007/978-3-319-09581-3_1

Premium Partner