Keynote Talk: Communication Without Repudiation: The Unanswered Question
A non-repudiation protocol is to be executed by two parties, say \(S\) and \(R\), in order to (1) enable \(S\) to send some text to \(R\) then receive some non-repudiated evidence that \(R\) has indeed received the text, and (2) enable \(R\) to receive both the sent text from \(S\) and some non-repudiated evidence that this text was indeed sent from \(S\) to \(R\). Since 1995, tens of non-repudiation protocols have been proposed, but every one of these protocols seems to suffer from one or more well-known problems. For example, most protocols assume the existence of a third party that is trusted by both \(S\) and \(R\). This observation reminds us that the following core question has never been answered. Can there be a non-repudiation protocol that does not suffer from any of these problems?
KeywordsResearch Agenda Sequence Number Message Signature Message Type Protocol Execution
The presentation in this paper has originated from extensive discussions with my two Ph.D. students Mr. Muqeet Ali and Ms. Rezwana Reaz. I am grateful for all their help.
- 2.Cox, B., Tygar, D., Sirbu, M.: NetBill security and transaction protocol. In: Proceedings of USENIX Workshop on Electronic Commerce, pp. 77–88, July 1995Google Scholar
- 3.Zhou, J., Gollmann, D.: A fair non-repudiation protocol. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 55–61, May 1996Google Scholar
- 4.Zhou, J., Gollmann, D.: An efficient non-repudiation protocol. In: Proceedings of the IEEE Computer Security Foundations Workshop, pp. 126–132, June 1997Google Scholar
- 5.Markowitch, O., Roggeman, Y.: Probabilistic non-repudiation without trusted third party. In: Proceedings of the Conference on Security in Communication Networks, September 1999Google Scholar
- 8.Muntean, C., Dojen, R., Coffey, T.: Establishing and preventing a new replay attack on a non-repudiation protocol. In: Proceedings of the 5-th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), pp. 283–290, August 2009Google Scholar
- 12.Zhou, J., Onieva, J., Lopez, J.: Optimized multi-party certified email protocols. Inf. Manag. Comput. Secur. 13(5), 350–366 (2005)Google Scholar