Skip to main content
Log in

Fair multi-party non-repudiation protocols

  • Regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

In this paper we introduce the concept of multi-party non-repudiation protocols. We define the aims of multi-party non-repudiation protocols, compare them to multi-party fair exchange and show some fundamental differences. We present two protocols, the first one using an online trusted third party and the second one using an offline trusted third party. We also show how to modify each of these protocols in order to provide confidentiality. The definitions and the resulting protocols are more general than the only comparable work, a multi-party certified e-mail protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Asokan N (1998) Fairness in Electronic Commerce. PhD thesis, University of Waterloo

  2. Asokan N, Baum-Waidner B, Schunter M, Waidner M (1998) Optimistic synchronous multi-party contract signing. Research Report RZ 3089, IBM Research Division

  3. Asokan N, Schunter M, Waidner M (1996) Optimistic protocols for multi-party fair exchange. Research Report RZ 2892 (# 90840), IBM Research

  4. Asokan N, Schunter M, Waidner M (1997) Optimistic protocols for fair exchange. In: Matsumoto T (ed) 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, ACM Press, pp 6, 8–17

  5. Bao F, Deng R, Nguyen KQ, Vardharajan V (1999) Multi-party fair exchange with an off-line trusted neutral party. In: DEXA’99 Workshop on Electronic Commerce and Security, Florence, Italy

  6. Ben-Or M, Goldreich O, Micali S, Rivest RL (1990) A fair protocol for signing contracts. IEEE Trans Inf Theory 36(1):40–46

  7. Boyd C (1988) Some applications of multiple key ciphers. In: Günther CG (ed) Advances in Cryptology – EUROCRYPT 88, Davos, Switzerland. Lecture Notes in Computer Science, vol 330. Springer, Berlin Heidelberg New York, pp 455–467

  8. Chiou G, Chen W (1989) Secure broadcasting using the secure lock. IEEE Trans Softw Eng 15(8):929–934

  9. Franklin M, Tsudik G (1998) Secure group barter: Multi-party fair exchange with semi-trusted neutral parties. Lecture Notes in Computer Science, vol 1465. Springer, Berlin Heidelberg New York

  10. Kremer S, Markowitch O (2000) A multi-party non-repudiation protocol. In: SEC 2000: 15th International Conference on Information Security, IFIP World Computer Congress, Beijing, China. Kluwer, pp 271–280

  11. Kremer S, Markowitch O (2000) Optimistic non-repudiable information exchange. In: Biemond J (ed) 21st Symp. on Information Theory in the Benelux, Wassenaar (NL), May 25–26. Werkgemeenschap Informatie – en Communicatietheorie, Enschede (NL), pp 139–146

  12. Markowitch O, Kremer S (2000) A multi-party optimistic non-repudiation protocol. In: Won D (ed) Proceedings of The 3rd International Conference on Information Security and Cryptology (ICISC 2000), Seoul, Korea. Lecture Notes in Computer Science, vol 2015. Springer, Berlin Heidelberg New York, pp 109–122

  13. Markowitch O, Roggeman Y (1999) Probabilistic non-repudiation without trusted third party. In: Second Conference on Security in Communication Networks’99, Amalfi, Italy

  14. You C, Zhou J, Lam K (1998) On the efficient implementation of fair non-repudiation. Comput Commun Rev 28(5):50–60

  15. Zhou J (1996) Non-repudiation. PhD thesis, University of London

  16. Zhou J, Deng R (2000) On the validity of digital signatures. Comput Commun Rev 30(2):29–34

  17. Zhou J, Deng R, Bao F (1999) Evolution of fair non-repudiation with TTP. In: ACISP: Information Security and Privacy: Australasian Conference. Lecture Notes in Computer Science, vol 1587. Springer, Berlin Heidelberg New York, pp 258–269

  18. Zhou J, Gollmann D (1996) A fair non-repudiation protocol. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Security Press, pp 55–61

  19. Zhou J, Gollmann D (1997) An efficient non-repudiation protocol. In: PCSFW: Proceedings of The 10th Computer Security Foundations Workshop. IEEE Computer Society Press

  20. Zhou J, Lam K (1999) Securing digital signatures for non-repudiation. Comput Commun 22(8):710–716

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Steve Kremer or Olivier Markowitch.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kremer, S., Markowitch, O. Fair multi-party non-repudiation protocols . IJIS 1, 223–235 (2003). https://doi.org/10.1007/s10207-003-0019-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-003-0019-3

Keywords

Navigation