skip to main content
article
Free Access

Non-repudiation with mandatory proof of receipt

Published:01 January 1996Publication History
Skip Abstract Section

Abstract

Non-repudiation allows an exchange of data between two principals in such a manner that the principals cannot subsequently deny their participation in the exchange. Current non-repudiation schemes, while providing a mandatory proof of origin service, generally provide only discretionary proof of receipt since it is difficult to enforce the return of the proof of receipt by the recipient.In this paper a new scheme for achieving mandatory mutual non-repudiation is proposed, encompassing both mandatory proof of origin and mandatory proof of receipt. The fundamental feature of the scheme is that the proofs of origin and receipt are not exchanged until both principals have submitted their digitally signed evidence to a trusted third party intermediary. This ensures that if the non-repudiation protocol is not completed, neither principal can gain from the exchange. An added advantage is that the process of dispute arbitration is considerably simplified since a small number of rules are required to decide whether an alleged data exchange took place.

References

  1. {Barb91} Barbut, Jean-Louis, ETEBAC 5: The standard for secure data exchange between banks and their corporate customers. SECURICOM'91, 9th Worldwide Congress on Computer and Communications Security and Protection, (March 1991), 199- 214.Google ScholarGoogle Scholar
  2. {CCITT88} CCITT. The directory - authentication framework. CCITT Rec. X.509, (1988).Google ScholarGoogle Scholar
  3. {CS95} Coffey, T. and Saidha, P. A logical verification of a non-repudiation protocol. Report #67/95, Department of Electronics & Computer Engineering, University of Limerick, Ireland, (1995).Google ScholarGoogle Scholar
  4. {DH76} Diffe, W. and Hellman, M. New directions in cryptography. IEEE Transactions on Information Theory, Vol. IT-22, No. 6, (Nov. 1976), 644-654.Google ScholarGoogle Scholar
  5. {GGKL89} Gasser, M., Goldstein, A., Kaufman, C. and Lampson, B. The Digital distributed system security architecture, 1989 National Computer Security Conference, (1989).Google ScholarGoogle Scholar
  6. {Herd95} Herda, S. Non-repudiation: constituting evidence and proof in digital cooperation, Computer Standards and Interfaces, Vol. 17, No. 1, (January 1995), 69-79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. {ISO89} ISO. Information processing systems - open systems interconnection - basic reference model - part 2: security architecture, ISO 7498-1, (1989).Google ScholarGoogle Scholar
  8. {KBN88} Karp, B.C., Barker, L.K. and Nelson, L.D. The secure data network system, AT&T Technical Journal, (May/June 1988), 19-27.Google ScholarGoogle Scholar
  9. {Linn91} Linn, J. Privacy-enhanced electronic mail: from architecture to implementation, Information Security, (1991), 233-243.Google ScholarGoogle Scholar
  10. {WC92} Wang, W. and Coffey, T. Network security: design of a global secure link, Proceedings of the International Federation of Information Processing (IFIP) TC11 8th International Conference on Information Security, Singapore, (1992), 103-113. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Non-repudiation with mandatory proof of receipt

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader