Non-repudiation is one of the most important security services. In this paper we present a novel non-repudiation technique, called Server-Supported Signatures, S3. It is based on one-way hash functions and traditional digital signatures. One of its highlights is that for ordinary users the use of asymmetric cryptography is limited to signature verification. S3 is efficient in terms of computational, communication and storage costs. It also offers a degree of security comparable to existing techniques based on asymmetric cryptography.
Keywordsdigital signatures non-repudiation electronic commerce network security distributed systems mobility
Unable to display preview. Download preview PDF.
- [For94]Warwick Ford. Computer Communications Security — Principles, Standard Protocols and Techniques. Prentice Hall, New Jersey, 1994.Google Scholar
- [HS]Stuart Haber and W. Scott Stornetta. How to time-stamp a digital document. Journal of Cryptology 3/2 (1991) 99–111.Google Scholar
- [ISO95a]ISO/IEC JTC1, Information Technology, SC 27. 2nd ISO/IEC CD 13888-1 Information Technology — Security Techniques — Non-repudiation — Part1: General Model. ISO/IEC JTC 1/SC 27 N 1105, May 1995.Google Scholar
- [ISO95b]ISO/IEC JTC1, Information Technology, SC 27. 2nd ISO/IEC CD 13888-2 Information Technology — Security Techniques — Non-repudiation — Part2: Using symmetric encipherment algorithms. ISO/IEC JTC 1/SC 27 N 1106, July 1995.Google Scholar
- [ISO95c]ISO/IEC JTC1, Information Technology, SC 27. ISO/IEC CD 13888-3 Information Technology — Security Techniques — Non-repudiation — Part3: Using asymmetric techniques. ISO/IEC JTC 1/SC 27 N 1107, September 1995.Google Scholar
- [Mer87]Ralph C. Merkle. A digital signature based on a conventional encryption function. In Carl Pomerance, editor, Advances in Cryptology — CRYPTO '87, number 293 in Lecture Notes in Computer Science, pages 369–378, Santa Barbara, CA, USA, August 1987. Springer-Verlag, Berlin Germany.Google Scholar
- [Pfi]Birgit Pfitzmann. Fail-stop signatures; principles and applications. Proc. Compsec '91, 8th world conference on computer security, audit and control, Elsevier, Oxford 1991, 125–134.Google Scholar
- [PPW91]Andreas Pfitzmann, Birgit Pfitzmann, and Michael Waidner. Practical signatures where individuals are unconditionally secure. Unpublished manuscript, available from the authors (email@example.com), 1991.Google Scholar
- [Sch96]Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons Inc., New York, second edition, 1996.Google Scholar