The design and analysis of an electronic evidence and non-repudiation protocol

An important aspect of network security is to ensure the confidentiality, integrity, fairness and validity of the data on the network. Non-repudiation is one of the most important network security services and it is mainly used in information processing system and e-commerce. Currently, most non-repudiation protocols have the trusted third party and are connection-oriented. Robert et al. suggested a transmission-oriented non-repudiation protocol CMP. This protocol has some limitations: 1) Cannot make data integrity proof for transferred information; 2) When transmitted data M is prodigious, each step of protocol for information transmission will be prodigious too. In this paper, we proposed a new transmission-oriented electronic evidence and non-repudiation protocol TEENP based on a trusted third part resolved the repudiation problem for receiver and sender, and extended the semantics and reasoning rules of the belief logic BAN. We also analyzed TEENP protocol with logic BAN. The protocol is fair, secure and efficient, compared with the corresponding protocols.

[1]  Ernest F. Brickell,et al.  Gradual and Verifiable Release of a Secret , 1987, CRYPTO.

[2]  Ye Cheng-qing Electronic evidence and non-repudiation protocol , 2000 .

[3]  Dieter Gollmann,et al.  Evidence and non-repudiation , 1997 .

[4]  Lawrence Bernstein,et al.  The system is the business—But at what cost? , 2005, Journal of Network and Systems Management.

[5]  Dieter Gollmann,et al.  A fair non-repudiation protocol , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[6]  Dan M. Nessett,et al.  A critique of the Burrows, Abadi and Needham logic , 1990, OPSR.

[7]  Tom Coffey,et al.  Non-repudiation with mandatory proof of receipt , 1996, CCRV.

[8]  Ellis Horowitz,et al.  A Randomized Protocol for , 2022 .

[9]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[10]  Robert H. Deng,et al.  Practical protocols for certified electronic mail , 1996, Journal of Network and Systems Management.