期刊文献+

一个含透明可信第三方的不可否认协议

A Non-repudiation Protocol with Transparent TTP
下载PDF
导出
摘要 在含脱线可信第三方的不可否认协议中,TTP的参与暴露出协议双方可能有一方不诚实,产生不好的社会影响。文章基于一类新型的CEMBS设计出一个含透明可信第三方的不可否认协议,仅从证据看不出TTP是否参与过此次协议,并且协议具有保密性、有效性、公平性与不可否认性。 In the previous non-repudiation protocols with off-line TTPS,the intervention of the TTP may be duo to a cheating party and exert a bad publicity.This paper designs an non-repudiation protocol with a transparent off-line TTP on the basis of a new CEMBS.This means that at the end of the protocol,by only looking at the produced evidences,it is impossible to decide whether the TTP did intervene in the protocol execution or not.And the protocol has security,effectiveness,fairness and non-repudiation.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第5期135-136,196,共3页 Computer Engineering and Applications
基金 国家自然科学基金(编号:10271069) 陕西省自然科学基础研究项目(编号:2002A03) 陕西师大重点研究项目
关键词 脱线可信第三方 透明可信第三方 不可否认 CEMBS off-line TTP,transparent TTP,non-repudiation,CEMBS
  • 相关文献

参考文献7

  • 1周永彬,张振峰,卿斯汉,季庆光,袁秀梅.基于RSA密码体制构造一类新型的CEMBS[J].计算机研究与发展,2004,41(3):420-425. 被引量:3
  • 2S Micali.Certified E-mail with invisible post offices[C].In:an invited presentation at the RSA'97conferences,1997.
  • 3F Bao,R H Deng,W Mao. Efficient and practical fair exchange protocols with off-line TTP[C].In:proc of 1998 IEEE Symp on Security and privacy, Oakland: IEEE Computer Press, 1998: 77~85.
  • 4R L Rivest,A shamir,L Adleman. A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978:21 (2): 120~126.
  • 5O Markowitch,S Kremer. An optimistic non-repudiation protocol with transparent trusted third party[C].In:Information Security Conference 2001, Lecture Notes in Computer Science, Springer, Berlin, 2001.
  • 6G Poupard,J Stern. Security analysis of a practical ‘on the fly' authentication and signature generation[C].In :Advances. in Cryptology:Proceedings of Eurocrypt'98 ,Lecture Notes in Computer Science,VOL. 1403.Springer, Berlin, 1998: 422~436.
  • 7M Girault.self-certified public keys,in:Advances in Cryptology[C].In:Proceedings of Eurocrypt'91 ,Lecture Notes in Computer Science,Springer, Berlin, 1991; 547: 490~497.

二级参考文献16

  • 1M K Franklin, M K Reiter. Fair exchange with a semi-trusted third party. The 4th ACM Conf on Computer and Communications Security, Zurich, 1997
  • 2O Markowitch, D Gollmann, S Kremer. On fairness in exchange protocols. The 5th Int'l Conf on Information Security and Cryptology, Seoul, Korea, 2002
  • 3S Brands. An efficient off-line electronic cash system based on the representation problem. Centrum voor Wiskunde en Informatica, Tech Rep: CS-R9323, 1993
  • 4J Zhou, C Tan. Playing lottery on the Internet. In: S Qing, T Okamoto, J Zhou eds. Proc of the 3rd Int'l Conf on Information and Communications Security(ICICS 2001). Beijing: Springer-Verlag, 2001. 189~201
  • 5F Bao, R H Deng, W Mao. Efficient and practical fair exchange protocols with off-line TTP. In: Proc of 1998 IEEE Symp on Security and Privacy. Oakland: IEEE Computer Press, 1998. 77~85
  • 6J Zhou, D Gollmann. A fair non-repudiation protocol. In: Proc of the 1996 IEEE Symp on Security and Privacy. Oakland: IEEE Computer Press, 1996. 55~61
  • 7C Boyd, E Foo. Off-line fair payment protocols using convertible signatures. In: Kazuo Ohta, Dingyi Pei eds. Advances in Cryptology (ASIACRYPT'98). Beijing: Springer-Verlag, 1998. 271~285
  • 8R L Rivest, A Shamir, L Adleman. A method for obtaining digital signatures and public-k0~126
  • 9A J Menand ions of the ACM, 1978, 21(2): 120-126
  • 10A J Menezes, P C Oorschot, S A Vanstone. Handbook of Applied Cryptography. New York: CRC Press, 1996

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部