Abstract
We present a multi-party non-repudiation protocol, based on a group encryption scheme. We define multi-party non-repudiation, compare it to multi-party fair exchange and show some fundamental differences between these two problems. This is the first effort to generalize non-repudiation to the multi-party case. Our definitions and the resulting protocol are more general than the ones given in the only comparable work, a multi-party certified mail protocol. Finally we also give an example of a group encryption scheme that can be used with our protocol.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35515-3_53
Chapter PDF
Similar content being viewed by others
References
Asokan, N. (1998). Fairness in Electronic Commerce. PhD thesis, University of Waterloo.
Asokan, N., Baum-Waidner, B., Schunter, M., and Waidner, M. (1998). Optimistic synchronous multi-party contract signing Research Report RZ 3089, IBM Research Division.
Asokan, N., Schunter, M., and Waidner, M. (1996). Optimistic protocols for multi-party fair exchange. Research Report RZ 2892 (# 90840), IBM Research.
Bao, F., Deng, R., Nguyen, K. Q., and Vardharajan, V. (1999). Multiparty fair exchange with an off-line trusted neutral party. In DEXA’99
Workshop on Electronic Commerce and Security,Florence, Italy. Ben-Or, M., Goldreich, O., Micali, S., and Rivest, R. L. (1990). A fair
protocol for signing contracts. IEEE Transactions on InformationTheory,36(1):40–46.
Boyd, C. (1988). Some applications of multiple key ciphers. In Advances in Cryptology—EUROCRYPT 88, volume 330 of Lecture Notes in Computer Science, pages 455–467, Davos, Switzerland. Springer-Verlag.
Chiou, G. and Chen, W. (1989). Secure broadcasting using the secure lock. IEEE Transactions on Software Engineering, 15 (8): 929–934.
Franklin, M. and Tsudik, G. (1998). Secure group barter: Multi-party fair exchange with semi-trusted neutral parties. Lecture Notes in Computer Science, 1465.
Markowitch, O. and Roggeman, Y. (1999). Probabilistic non-repudiation without trusted third party. In Second Conference on Security in Communication Networks’99,Amalfi, Italy.
Zhou, J. and Gollmann, D. (1997). An efficient non-repudiation protocol. In Proceedings of The 10th Computer Security Foundations Workshop IEEE Computer Society Press.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this paper
Cite this paper
Kremer, S., Markowitch, O. (2000). A Multi-Party Non-Repudiation Protocol. In: Qing, S., Eloff, J.H.P. (eds) Information Security for Global Information Infrastructures. SEC 2000. IFIP — The International Federation for Information Processing, vol 47. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35515-3_28
Download citation
DOI: https://doi.org/10.1007/978-0-387-35515-3_28
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5479-7
Online ISBN: 978-0-387-35515-3
eBook Packages: Springer Book Archive