Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2000, Vol. 1 Issue (3): 317-321    DOI: 10.1631/jzus.2000.0317
Science & Engineering     
A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY
JIANG Xiao-ning, YE Cheng-qing
Dept.of Computer Sci. & Tech., Zhejiang University, Hangzhou, 310027, China
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  Non-repudiation services provide the parties involved in a transaction with protection against the other party by denying that a particular event or action took place. They collect irrefutable evidence to support the resolution of any such disagreement. We address this security issue by first examining the previous work done in this area, and then propose a novel protocol to achieve mutual non-repudiation service, encompassing both mandatory evidence of origin and mandatory evidence of receipt. By using two simple ideas, a conditional signature and a public notice board, the novel protocol can achieve this security service in a simple but effective manner. By applying cryptography technology, this protocol also provides privacy for the parties using the security service.

Key wordsnon-repudiation      privacy      electronic business      network security     
Received: 01 June 1999     
CLC:  TP393  
  TP309  
Cite this article:

JIANG Xiao-ning, YE Cheng-qing. A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2000, 1(3): 317-321.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.2000.0317     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2000/V1/I3/317

[1] Feng LI, Jin MA, Jian-hua LI. Distributed anonymous data perturbation method for privacy-preserving data mining[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(7): 952-963.
[2] Qiong WEI, Yan-sheng LU, Lei ZOU. ε-inclusion: privacy preserving re-publication of dynamic datasets[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(8): 1124-1133.
[3] LIAO Jian, QI Ying-hao, HUANG Pei-wei, RONG Meng-tian, LI Sheng-hong. Protection of mobile location privacy by using blind signature[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(6 ): 8-.