期刊文献+

电子证据与反拒认协议 被引量:9

Electronic evidence and non-repudiation protocol
下载PDF
导出
摘要 反拒认是在计算机网络上实现电子贸易的重要前提之一。电子证据则是反拒认技术的基础。本文讨论了电子证据的种类 ,构成成分及其有效性。在此基础上 ,提出了一种公平的反拒认协议 ,同时解决了收方和发方的拒认问题。它基于条件证据和反拒认服务器两个简单思想 ,既高效又实用。 Non-repudiation is one of the most important premises to achieve elec t ronic trade on computer networks,which is based on electronic evidence This pa pe r discusses types of non-repudiation evidence,elements of non-repudiation evi d ence and validity of non-repudiation evidence We propose a fair non-repudiati o n protocol to solve repudiation problem both in sender side and in receiver side By using two simple ideas,a conditional signature and a non-repudiation serv er ,our protocol can achieve non-repudiation service in an efficient and practica l manner
出处 《通信学报》 EI CSCD 北大核心 2000年第7期76-81,共6页 Journal on Communications
基金 国家自然科学基金资助项目! (6 9884 0 0 3)
关键词 电子证据 反拒认协议 计算机网络安全 electronic evidence non-repudiation protocol computer network security
  • 相关文献

参考文献4

  • 1You C H,Computer Communications Review,1998年,28卷,5期,50页
  • 2Zhou J,Lecture Notesin Computer Science 1163,Advances in Cryptology :Pro ceedingsofAsia,1996年,133页
  • 3Zhou J,Proceedings of 1996 IEEE Symposium on Security and Privacy,1996年,55页
  • 4Gong L,IEEE J Selected Areas Commun,1993年,11卷,6期,657页

同被引文献37

  • 1[1]Zhou J, Gollmann D. Evidence and non-repudiation[J]. Journal of Network and Computer Applications, 1997, 25 (2):19-25
  • 2[2]Zhou J, Gollmann D. A fair non-repudiation protocol[C]. In: Proceedings of 1996 IEEE Symposium on Security and Privacy, California: IEEE Press, 1996. 55-61
  • 3[3]Even S, Goldreich O, Lempel A. A randomized protocol for signing contacts[J]. Commun ACM, 1985, 28:637-647
  • 4[4]Brickell E, Chaum D, Damgard I, et al. Gradual and verifiable release of a secret[C]. In: Advances in CryptologyProceedings of CRYPT' 87, Berlin: Springer-Verlag, 1988.25-30
  • 5[5]Coffey T, Saidha P. Non-repudiation with mandatory proof of receipt[J]. Computer Communication Review, 1996, 26(1): 6-18
  • 6[7]Robert H, Deng L G. Practical protocols for certified electronic mail[J]. Journal of Network Systems Management,1996, 4(3): 1-6
  • 7[8]Burrows M. A logic of authentication[J]. ACM Trans. on Computer System, 1990, 8(1): 18-36
  • 8[9]Boyd C, Mao W. On a limitations of BAN logic[C]. In: Lecture Notes in Computer Science, Berlin: Springer-Verlag,1993. 240-247
  • 9[10]Nessett D M. A critique of burrows, abadi and needham logic[J]. Operating System Review, 1990,24(2): 35-38
  • 10[13]Kailar R. Accountability in electronic commerce protocols[J]. IEEE Transactions on Software Engineering, 1996,`22(5): 313-328

引证文献9

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部