Probabilistic Non-Repudiation without Trusted Third Party

We present a new theoretical generic protocol that offers non-repudiation services. We first go through the state of the art about non-repudiation. We will see that in order to achieve complete nonrepudiation during an information transfer a trusted third party is often needed (even playing a low weight role), obtaining an acknowledgement from the recipient being the current major problem. We aim to show the possibility of achieving fair non-repudiation services without the need of a third party. We will propose a concrete implementation inspired by this generic protocol.

[1]  Paul F. Syverson,et al.  A different look at secure distributed computation , 1997, Proceedings 10th Computer Security Foundations Workshop.

[2]  N. Asokan,et al.  Asynchronous protocols for optimistic fair exchange , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[3]  Dieter Gollmann,et al.  Certified Electronic Mail , 1996, ESORICS.

[4]  Robert H. Deng,et al.  Efficient and practical fair exchange protocols with off-line TTP , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[5]  Nadarajah Asokan,et al.  Fairness in electronic commerce , 1998, Research report / RZ / IBM / IBM Research Division / Zürich Research Laboratory.

[6]  Bart Preneel,et al.  Integrity Primitives for Secure Information Systems: Final RIPE Report of RACE Integrity Primitives Evaluation , 1995 .

[7]  Silvio Micali,et al.  A fair protocol for signing contracts , 1990, IEEE Trans. Inf. Theory.

[8]  Tom Tedrick,et al.  How to Exchange Half a Bit , 1983, CRYPTO.

[9]  Dieter Gollmann,et al.  Evidence and non-repudiation , 1997 .

[10]  Oded Goldreich,et al.  A Simple Protocol for Signing Contracts , 1983, CRYPTO.

[11]  Kazuo Ohta,et al.  How to simultaneously exchange secrets by general assumptions , 1994, CCS '94.

[12]  N. Asokan,et al.  Optimistic protocols for fair exchange , 1997, CCS '97.

[13]  Markus Jakobsson,et al.  Ripping Coins For a Fair Exchange , 1995, EUROCRYPT.

[14]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[15]  Tom Tedrick,et al.  Fair Exchange of Secrets , 1984, CRYPTO.

[16]  N. Asokan,et al.  Optimistic fair exchange of digital signatures , 1998, IEEE Journal on Selected Areas in Communications.

[17]  Dieter Gollmann,et al.  An efficient non-repudiation protocol , 1997, Proceedings 10th Computer Security Foundations Workshop.

[18]  Michael O. Rabin,et al.  Transaction Protection by Beacons , 1983, J. Comput. Syst. Sci..

[19]  Paul F. Syverson,et al.  Weakly secret bit commitment: applications to lotteries and fair exchange , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).

[20]  Dieter Gollmann,et al.  Observations on Non-repudiation , 1996, ASIACRYPT.

[21]  Yongfei Han Investigation of non-repudiation protocols , 1996, ACISP.

[22]  Robert H. Deng,et al.  Practical protocols for certified electronic mail , 1996, Journal of Network and Systems Management.