Skip to main content

Observations on non-repudiation

  • Conference paper
  • First Online:
Advances in Cryptology — ASIACRYPT '96 (ASIACRYPT 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1163))

Abstract

This paper discusses non-repudiation services regarding the transfer of a message and classifies the roles of trusted third parties involved in non-repudiation services. We examine the selective receipt problem and the generation of time evidence, analyse the current state of the ISO/IEC 13888 drafts on non-repudiation mechanisms, and present a fair non-repudiation protocol including time evidence to promote the development of these drafts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ISO 7498-2. Information processing system — Open systems interconnection — Basic reference model, Part 2: Security architecture. International Organization for Standardization, 1989.

    Google Scholar 

  2. ISO/IEC CD 10181-1. Information technology — Open systems interconnection — Security frameworks in open systems, Part 1: Overview of open systems security framework. ISO/IEC JTC1/SC21 N8509, April 1994.

    Google Scholar 

  3. ISO/IEC DIS 10181-4. Information technology — Open systems interconnection — Security frameworks in open systems, Part 4: Non-repudiation. ISO/IEC, 1995.

    Google Scholar 

  4. ISO/IEC 3rd CD 13888-1. Information technology — Security techniques — Non-repudiation, Part 1: General model. ISO/IEC JTC1/SC27 N1274, March 1996.

    Google Scholar 

  5. ISO/IEC 3rd CD 13888-2. Information technology — Security techniques — Non-repudiation, Part 2: Using symmetric encipherment algorithms. ISO/IEC JTC1/SC27 N1276, January 1996.

    Google Scholar 

  6. ISO/IEC 2nd CD 13888-3. Information technology — Security techniques — Non-repudiation, Part 3: Using asymmetric techniques. ISO/IEC JTC1/SC27 N1379, June 1996.

    Google Scholar 

  7. ISO/IEC 3rd WD 13888-3. 3rd working draft on Non-repudiation, Part 3: Mechanisms using asymmetric techniques. ISO/IEC JTC1/SC27/WG2 N224, July 1993.

    Google Scholar 

  8. J. B. Postel and J. K. Reynolds. File transfer protocol. RFC 959, October 1985.

    Google Scholar 

  9. J. Zhou and D. Gollmann. A fair non-repudiation protocol. Proceedings of 1996 IEEE Symposium on Security and Privacy, pages 55–61, Oakland, CA, May 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Kwangjo Kim Tsutomu Matsumoto

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag

About this paper

Cite this paper

Zhou, J., Gollmann, D. (1996). Observations on non-repudiation. In: Kim, K., Matsumoto, T. (eds) Advances in Cryptology — ASIACRYPT '96. ASIACRYPT 1996. Lecture Notes in Computer Science, vol 1163. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0034842

Download citation

  • DOI: https://doi.org/10.1007/BFb0034842

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61872-0

  • Online ISBN: 978-3-540-70707-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics