Light-weight Mutual Authentication with Non-repudiation
نویسندگان
چکیده
منابع مشابه
Non-repudiation Analysis with LySa
This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus LYSA, using an extended syntax with annotations. Non-repudiation is verified using a Control Flow Analysis, following the same approach of M. Buchholtz and H. Gao for authentication and freshness analyses. The result is an analysis that can statically che...
متن کاملSigncryption with Non-interactive Non-repudiation
Signcryption [35] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a composition of public key encryption and public key signature. We present a model of security for signcryption schemes that offer non-interactive nonrepudiation. This is non-repudiation in which the judge settling a ...
متن کاملAn Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-Repudiation
Enhanced Pretty Good Privacy (EPGP) is a new cryptosystem based on Pretty Good Privacy (PGP), used for the purpose of secure e-mail message communication over an open network. The idea of EPGP, introduced in this paper, addresses PGP's main drawback of incomplete non-repudiation service, and therefore, attempts to increase the degree of security and efficiency of e-mail message communication.
متن کاملA Unlinkable Delegation-based Authentication Protocol with Users’ Non- repudiation for Portable Communication Systems
For portable communication systems, the delegation-based authentication protocol provides efficient subsequent login authentication, data confidentiality, user privacy protection, and non-repudiation. However, in all proposed protocols, the non-repudiation of mobile users is based on an unreasonable assumption that home location registers are always trusted. To weaken this assumption and enhanc...
متن کاملMutual Authentication with Smart Cards
The World Wide Web has become the de facto interface for consumer oriented electronic commerce. So far the interaction between consumers and merchants is mostly limited to providing information about products and credit card based payments for mail orders. This is largely due to the lack of security currently available for commercial transactions. At the moment the only security mechanism prese...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Radioengineering
سال: 2018
ISSN: 1210-2512
DOI: 10.13164/re.2018.0143