Nonrepudiation

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 1161 Experts worldwide ranked by ideXlab platform

Yu-min Wang - One of the best experts on this subject based on the ideXlab platform.

Javier Lopez - One of the best experts on this subject based on the ideXlab platform.

  • multiparty Nonrepudiation a survey
    ACM Computing Surveys, 2009
    Co-Authors: Jose A Onieva, Jianying Zhou, Javier Lopez
    Abstract:

    Nonrepudiation is a security service that plays an important role in many Internet applications. Traditional two-party Nonrepudiation has been studied intensively in the literature. This survey focuses on multiparty scenarios and provides a comprehensive overview. It starts with a brief introduction of fundamental issues on Nonrepudiation, including the types of Nonrepudiation service and cryptographic evidence, the roles of trusted third-party, Nonrepudiation phases and requirements, and the status of standardization. Then it describes the general multiparty Nonrepudiation problem, and analyzes state-of-the-art mechanisms. After this, it presents in more detail the 1-N multiparty Nonrepudiation solutions for distribution of different messages to multiple recipients. Finally, it discusses advanced solutions for two typical multiparty Nonrepudiation applications, namely, multiparty certified email and multiparty contract signing.

Mohamed G Gouda - One of the best experts on this subject based on the ideXlab platform.

  • NETYS - Nonrepudiation Protocols Without a Trusted Party
    Networked Systems, 2016
    Co-Authors: Rezwana Reaz, Mohamed G Gouda
    Abstract:

    A Nonrepudiation protocol from party S to party R performs two tasks. First, the protocol enables party S to send to party R some text x along with sufficient evidence (that can convince a judge) that x was indeed sent by S. Second, the protocol enables party R to receive text x from S and to send to S sufficient evidence (that can convince a judge) that x was indeed received by R. Almost every published Nonrepudiation protocol from party S to party R involves three parties: the two original parties S and R, and a third party that is often called a trusted party. A well-known Nonrepudiation protocol that does not involve a third party is based on an assumption that party S knows an upper bound on the computing power of party R. This assumption does not seem reasonable especially since by violating this assumption, party R can manipulate the Nonrepudiation protocol so that R obtains all its needed evidence without supplying party S with all its needed evidence. In this paper, we show that Nonrepudiation protocols that do not involve a third party can be designed under reasonable assumptions. Moreover, we identify necessary and sufficient (reasonable) assumptions under which these protocols can be designed. Finally, we present the first ever \(\ell \)-Nonrepudiation protocol that involves \(\ell \) parties (none of which is trusted), where \(\ell \) \(\ge \) 2.

  • Nonrepudiation protocols in cloud systems
    International Conference on Computing Communication and Networking Technologies, 2016
    Co-Authors: Mohamed G Gouda
    Abstract:

    A Nonrepudiation protocol from a sender S to a set of potential receivers {R1, R2, ..., Rn} performs two functions. First, this protocol enables S to send to every potential receiver Ri a copy of file F along with a proof that can convince an unbiased judge that F was indeed sent by S to Ri. Second, this protocol also enables each Ri to receive from S a copy of file F and to send back to S a proof that can convince an unbiased judge that F was indeed received by Ri from S. When a Nonrepudiation protocol from S to {R1, R2, ..., Rn} is implemented in a cloud system, the communications between S and the set of potential receivers {R1, R2, ..., Rn} are not carried out directly. Rather, these communications are carried out through a cloud C. In this paper, we present a Nonrepudiation protocol that is implemented in a cloud system and show that this protocol is correct. We also show that this protocol has two clear advantages over Nonrepudiation protocols that are not implemented in cloud systems.

  • ICCCNT - Nonrepudiation Protocols in Cloud Systems
    Proceedings of the 7th International Conference on Computing Communication and Networking Technologies - ICCCNT '16, 2016
    Co-Authors: Mohamed G Gouda
    Abstract:

    A Nonrepudiation protocol from a sender S to a set of potential receivers {R1, R2, ..., Rn} performs two functions. First, this protocol enables S to send to every potential receiver Ri a copy of file F along with a proof that can convince an unbiased judge that F was indeed sent by S to Ri. Second, this protocol also enables each Ri to receive from S a copy of file F and to send back to S a proof that can convince an unbiased judge that F was indeed received by Ri from S. When a Nonrepudiation protocol from S to {R1, R2, ..., Rn} is implemented in a cloud system, the communications between S and the set of potential receivers {R1, R2, ..., Rn} are not carried out directly. Rather, these communications are carried out through a cloud C. In this paper, we present a Nonrepudiation protocol that is implemented in a cloud system and show that this protocol is correct. We also show that this protocol has two clear advantages over Nonrepudiation protocols that are not implemented in cloud systems.

  • two phase Nonrepudiation protocols
    International Conference on Computing Communication and Networking Technologies, 2016
    Co-Authors: Rezwana Reaz, Mohamed G Gouda
    Abstract:

    A Nonrepudiation protocol from party S to party R performs two tasks. First, the protocol enables party S to send to party R some text x along with a proof (that can convince a judge) that x was indeed sent by S. Second, the protocol enables party R to receive text x from S and to send to S a proof (that can convince a judge) that x was indeed received by R. A Nonrepudiation protocol from one party to another is called two-phase iff the two parties execute the protocol as specified until one of the two parties receives its complete proof. Then and only then does this party refrain from sending any message specified by the protocol because these messages only help the other party complete its proof. In this paper, we present methods for specifying and verifying two-phase Nonrepudiation protocols.

  • ICCCNT - Two-phase Nonrepudiation Protocols
    Proceedings of the 7th International Conference on Computing Communication and Networking Technologies - ICCCNT '16, 2016
    Co-Authors: Rezwana Reaz, Mohamed G Gouda
    Abstract:

    A Nonrepudiation protocol from party S to party R performs two tasks. First, the protocol enables party S to send to party R some text x along with a proof (that can convince a judge) that x was indeed sent by S. Second, the protocol enables party R to receive text x from S and to send to S a proof (that can convince a judge) that x was indeed received by R. A Nonrepudiation protocol from one party to another is called two-phase iff the two parties execute the protocol as specified until one of the two parties receives its complete proof. Then and only then does this party refrain from sending any message specified by the protocol because these messages only help the other party complete its proof. In this paper, we present methods for specifying and verifying two-phase Nonrepudiation protocols.

Robert Jueneman - One of the best experts on this subject based on the ideXlab platform.

  • securing wireless medicine confidentiality integrity Nonrepudiation malware prevention
    2011 8th International Conference & Expo on Emerging Technologies for a Smarter World, 2011
    Co-Authors: Robert Jueneman
    Abstract:

    Wireless medicine is a growing part of the telehealth initiative, but the use of wireless medicine poses significant risks to both the patient/caregiver and the clinician or health care institution. Confidentiality, integrity, Nonrepudiation, and malware prevention are all vitally important considerations. The use of smart cards for both patient and clinician identification and authorization is encouraged, as well as the use of equivalent technology embedded within medical devices. A public policy solution to advance the availability of medical smart cards is urged, whereby Medicare/Medicaid, the Veterans Administration, and TRICARE would issue smart cards to their enrollees. The cost of such a deployment is conservatively estimated as less than $814 million, compared to the current cost of medical identity theft nationwide, estimated at $28 billion. Even if this technology were extended to the entire US population, the cost would only be about $3 billion, or a little more than a tenth of the current fraud costs, while providing a significant long-term benefit in terms of confidentiality, integrity, and Nonrepudiation.

  • Securing wireless medicine confidentiality, integrity, Nonrepudiation, & malware prevention
    2011 8th International Conference & Expo on Emerging Technologies for a Smarter World, 2011
    Co-Authors: Robert Jueneman
    Abstract:

    Wireless medicine is a growing part of the telehealth initiative, but the use of wireless medicine poses significant risks to both the patient/caregiver and the clinician or health care institution. Confidentiality, integrity, Nonrepudiation, and malware prevention are all vitally important considerations. The use of smart cards for both patient and clinician identification and authorization is encouraged, as well as the use of equivalent technology embedded within medical devices. A public policy solution to advance the availability of medical smart cards is urged, whereby Medicare/Medicaid, the Veterans Administration, and TRICARE would issue smart cards to their enrollees. The cost of such a deployment is conservatively estimated as less than $814 million, compared to the current cost of medical identity theft nationwide, estimated at $28 billion. Even if this technology were extended to the entire US population, the cost would only be about $3 billion, or a little more than a tenth of the current fraud costs, while providing a significant long-term benefit in terms of confidentiality, integrity, and Nonrepudiation.

Jose A Onieva - One of the best experts on this subject based on the ideXlab platform.

  • multiparty Nonrepudiation a survey
    ACM Computing Surveys, 2009
    Co-Authors: Jose A Onieva, Jianying Zhou, Javier Lopez
    Abstract:

    Nonrepudiation is a security service that plays an important role in many Internet applications. Traditional two-party Nonrepudiation has been studied intensively in the literature. This survey focuses on multiparty scenarios and provides a comprehensive overview. It starts with a brief introduction of fundamental issues on Nonrepudiation, including the types of Nonrepudiation service and cryptographic evidence, the roles of trusted third-party, Nonrepudiation phases and requirements, and the status of standardization. Then it describes the general multiparty Nonrepudiation problem, and analyzes state-of-the-art mechanisms. After this, it presents in more detail the 1-N multiparty Nonrepudiation solutions for distribution of different messages to multiple recipients. Finally, it discusses advanced solutions for two typical multiparty Nonrepudiation applications, namely, multiparty certified email and multiparty contract signing.