منابع مشابه
Approaching decentralized non-repudiation
Securing data exchanges is a major preoccupation, and several techniques have been developed to reach that aim. The predominant model for such exchange is that which relies on trusted third-parties. Meanwhile, emerging technologies such as IoT are set to broadcast growing amounts of sensitive data, thereby making centralized architectures problematic for privacy and performance reasons and maki...
متن کاملIntermediary Non-repudiation Protocols
In commercial transactions, an intermediary might be involved to help transacting parties to conduct their business. Nevertheless, the intermediary may not be fully trusted. In this paper, we introduce the concept of intermediary (or agent) in a non-repudiation protocol, define the aims of intermediary non-repudiation protocols, and analyze their security requirements. We present a simple scena...
متن کاملOptimistic Non-repudiation Protocol Analysis
Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis me...
متن کاملNon-repudiation Analysis with LySa
This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus LYSA, using an extended syntax with annotations. Non-repudiation is verified using a Control Flow Analysis, following the same approach of M. Buchholtz and H. Gao for authentication and freshness analyses. The result is an analysis that can statically che...
متن کاملSigncryption with Non-interactive Non-repudiation
Signcryption [35] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a composition of public key encryption and public key signature. We present a model of security for signcryption schemes that offer non-interactive nonrepudiation. This is non-repudiation in which the judge settling a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ICST Transactions on Ubiquitous Environments
سال: 2018
ISSN: 2032-9377
DOI: 10.4108/eai.12-1-2018.153559