Undeniable Cryptographic Protocol for Both Sender and Receiver and Its Applications
-
摘要: 在数据通信中,数字签名技术保证了数据发送不可否认性和数据完整性,而接收数据的不可否认性在安全通信中也是极为重要的.近年来,实现这类型的密码协议主要是通过可信第三方参与数据的加密与传送,因而可信第三方的可靠性和安全性是系统性能的瓶颈.文中提出了一个双方不可否认的密码协议,这个协议解决了可信第三方的性能瓶颈问题,是一个更有效率的密码协议,最后探讨了它在电子邮件中的应用.Abstract: In data communications, digital signature schemes have been used to ensure non-repudiation of sending data and the integrality of data, and non-repudiation of receiving data is also very important in the secure communication. In the past years, this kind of cryptographic protocols was mainly implemented by the intervention of the trusted third party in transmission and encryption of data, thus the dependability and security of the trusted third party was a bottleneck in these secure systems. To solve this problem, an undeniable cryptographic protocol for both sender and receiver is proposed. It is more efficient. Finally, its applications in electric mail are discussed.
-
Key words:
- secret communication /
- protocol /
- data communication /
- digital signature /
- cryptographic protocol
-
[1] Even S, Goldreich O, Lempel A. A randomizing protocol for signing contracts[J]. Communications of the ACM, 1985, 28(6):637~647. [2] Zhou J, Gollman D. A fair non-repudiation protocol. In:Roscheisen M, Serban C, eds. Proceeding of 1996 IEEE Symposium on Security and Privacy. Oakland:IEEE Computer Society Press, 1996. 55~61. [3] 卿斯汉,常晓林,章 江. 安全电子商务协议iKPI的设计和实现. 见:卿斯汉,冯登国编. 信息和通信安全——CCICS'99:第一届中国信息和通信安全学术会议论文集. 北京:科学出版社,2000.230~239. [4] Zimmermann P R. The official PGP user's guide[M]. Boston:MIT Press, 1995. [5] 王育民,刘建伟. 通信网的安全——理论与技术[M]. 西安:西安电子科技大学出版社, 1999.
点击查看大图
计量
- 文章访问数: 2325
- HTML全文浏览量: 110
- PDF下载量: 1080
- 被引次数: 0