期刊文献+

基于条件可信第三方的不可否认协议

Non-repudiation protocol based on conditional trusted third party
在线阅读 下载PDF
导出
摘要 扩展半可信第三方的思想,提出"条件可信第三方"的概念,即任意第三方在满足限定条件的前提下,要么是可信的,要么行为是可验证的.同时,结合离线第三方的思想,提出基于离线条件可信第三方的不可否认协议.相比于原有协议,新的协议进一步减少了对可信第三方的依赖. The idea of conditional TTP was developed on the basis semi-trusted TTP. The term of 'conditional trusted third party' means that on the condition of third party satisfying the pre-conditions, if he behaves right, then he is trusted, else his behavior can be checked by participators of the protocol. A new protocol adopting off-line and conditional TTP was put forward. Compared with available non-repudiation protocols, this one progresses further in reducing intervention of TTP in fair exchange.
作者 沈炜 陈纯
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2004年第1期35-38,共4页 Journal of Zhejiang University:Engineering Science
关键词 条件可信第三方 不可否认协议 安全协议 离线第三方 网络环境 non-repudiation conditional TTP security protocols
  • 相关文献

参考文献10

  • 1[1]ISO/IEC DIS10181- 4. Information technology-open systems interconnection-Security frameworks in open systems, Part4: Non-repudiation [S], 1995-04.
  • 2[2]SCHNEIER B. Applied Cryptography-Protocols, algorithms, and source code in C [M]. 2nd ed. New York:Wiley, 1996.
  • 3[3]EVEN S, GOLDREICH O, LEMPEL A. A randomizing protocol for signing contracts [J]. Communications of the ACM, 1985, 28(6):637-647.
  • 4[4]OKAMOTO T, OHTA K. How to simultaneously exchange secrets by general assumptions [A]. Proceedings of 2nd ACM Conference on Computer and Communications Security [C]. Fairfax, Virginia: [s. n. ],1994:184- 192.
  • 5[5]BENOR M, GOLDREICH O, MICALI S, et al. A fair protocol for signing contracts [J]. IEEE Transactions on Information Theory, 1990, 36(1): 40-46.
  • 6[6]PAGNIA H, GATNER F C. On the Impossibility of Fair Exchange without a Trusted Third Party [R].Darmstadt, Germany: Darmstadt University of Technology, 1999.
  • 7[7]ZHOU J, GOLLMANN D. A fair non-repudiation protocol [A]. Proceedings of 1996 IEEE Symposium on Security and Privacy [C]. Oakland: IEEE Computer Society Press, 1996:55-61.
  • 8[8]ASOKAN N, SHOUP V, WAIDNER M. Asynchronous protocols for optimistic fair exchange [A].Proceedings of IEEE Symposium on Research in Security and Privacy [C]. Oakland: IEEE Computer Society Press,1998: 86-99.
  • 9[9]BAO F, DENG R H, MAO W. Efficient and practical fair exchange protocols with off-line TTP [A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Oakland: IEEE Computer Society Press, 1998:77-85.
  • 10[10]FRANKLIN M K, REITER M K. Fair Exchange with a Semi-trusted Third Party [A]. Proceedings of the Fourth ACM Conference on Computer and Communications Security [C]. Zurich: [s. n. ],1997:1 - 6.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部