期刊文献+

密钥链多方非否认协议 被引量:2

Multi-party Non-repudiation Protocol Using Key Chains
下载PDF
导出
摘要 多方非否认协议通常仅考虑一轮消息交换的情况,很少讨论相同参与方进行多轮消息交换的情况。基于后者对多方非否认协议进行优化,提出了一种利用密钥链实现的多方非否认协议,以有效减轻TTP存储负担。协议由Initialization,Exchange,Abort和Recovery4个子协议以及争议处理方案组成。分析表明,协议满足公平性、时限性和机密性。 The previous multi-party non-repudiation protocols normally focus on one round message exchange. The multi-round message exchanges within the.same participatores are not studied well. For the latter condition,we presented a multi-party non-repudiation protocol using key chains which can reduce the TTP's storage requirements. The protocol consists of a dispute resolution policy and four sub-protocols, i. e. , the initialization sub-protocol, the exchange sub-protocol, the abort sub-protocol and the recovery sub-protocol. Technical discussions show that the protocol satis-fies fairness,timeliness and confidentiality.
出处 《计算机科学》 CSCD 北大核心 2009年第10期89-90,97,共3页 Computer Science
基金 国家自然科学基金(60473027)资助
关键词 安全协议 非否认 多方协议 密钥链 Security protocol, Non-repudiation, Multi-party protocol,Key chains
  • 相关文献

参考文献11

  • 1Zhou J, Gollmann D. A fair non-repudiation protocol[C]//Proceedings of the 1996 IEEE Symposium on Security and Privacy. Oakland, 1996 : 55-61.
  • 2Wang G. Generic non-repudiation protocols supporting transparent off-line TTP[J]. Journal of Computer Security, 2006, 14 (5) :441-467.
  • 3Cederquist J, Dashti M T, Mauw S. A Certified Email Protocol Using Key Chains[C]//Advanced Information Networking and Applications Workshops(AINAW '07). 21st International Conference. 2007 : 525-530.
  • 4Liang X, Cao Z, Lu R, et al. Efficient and secure protocol in fair document exchange [J]. Computer Standards & Interfaces, 2008,30(3) : 167-176.
  • 5Perrnpoontanalarp Y,Kanokkanjanapong J. Dynamic Undeniable Fair Certified Ernail with DDoS Protection[C] //Advanced Information Networking and Applications. Okinawa, 2008.
  • 6Kremer S, Markowitch O. A multi-party non-repudiation protoco[C]//15th International Conference on Information Security. IFIP World Computer Congress. Beijing, China, 2000 : 271-280.
  • 7Markowitch O, Kremer S. A Multi-party Optimistic Non-repudiation Protocol[C]//Information Security and Cryptology-ICISC 2000: Third International Conference Seoul, Korea: Spinger- Verlag, 2001 : 109-122.
  • 8Onieva J A, Zhou J, Lopez J. Non-repudiation protocols for multiple entities [J]. Computer Communications, 2004, 27 ( 16 ) : 1608-1616.
  • 9Zhou J, Onieva J, Lopez J. Optimized multi-party certified email protocols[J]. Information Management and Computer Security, 2005,13 (5) : 350-366.
  • 10Wang H,Wang R. Improvement of a multi-party certified email protocol[J]. Chinese Journal of Electronics, 2007, 16 (4) : 613- 616.

同被引文献9

  • 1Lysaght P, Stockwood J. A simulation tool for dynamically reconfigurable field programmable gate arrays[J]. IEEE Tran- sactions on Very Large Scale Integration(VLSI)Systems, 1996, 4(3) 381-390.
  • 2Upegui A, Pefia-Reyes C A, Sanchez E. An FPGA platform for on-line topology exploration of spiking neural networks[J]. Mi- croprocessors and microsystems, 2005,29 (5) : 211-223.
  • 3Upegui A, Pefla-Reyes C A, Sanchez E. A methodology for evol- ving spiking neural-network topologies on line using partial dy- na_rrfic reeonfiguration[C]//Intemational Conference on Compu- tational Intelligenc. Medellin, Colombia, 2003.
  • 4Devic F, Torres L, Badrignans B. Secure protocol implementa- tion for remote bitstream update preventing replay attacks on FPGA[C] // 2010 International Conference on Field Program- mable Logic and Applications(FPL). IEEE, 2010 : 179-182.
  • 5Actel. ProASIC Handbook. 2008 [O]. www. actel, corn/ documents/PA3 HB. pdf.
  • 6Badrignans B, Elbaz R, Torres L. Secure FPGA configuration technique preventing system downgrade[C]//Proceedings of the 18th International Conference on Field Programmable Logic and Applications(FPL' 08). 2008.
  • 7Drimer S. Volatile FPGA design security-a survey [M]. IEEE Computer Society Annual Volume, 2008 : 292-297.
  • 8Lamport L. Password authentication with insecure communica- tion[J]. Communications of the ACM, 1981,24(11) : 770-772.
  • 9Cederquist J, Dashti M T, Mauw S. A certified email protocol u- sing key chains [C]// Advanced Information Networking and Applications Workshops, 2007, AINAW 07. 21st International Conference on. IEEE, 2007 525-530.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部