Cover image for Non-repudiation in electronic commerce
Title:
Non-repudiation in electronic commerce
Personal Author:
Series:
Artech House computer security series
Publication Information:
Boston, MA : Artech House, 2001
ISBN:
9781580532471

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004886846 HF5548.32 Z49 2001 Open Access Book Book
Searching...

On Order

Summary

Summary

With more and more businesses shifting emphasis towards the Internet, new ways of protecting transacting parties are needed in the world of e-commerce. This volume shows the reader how to create, collect, validate and maintain cryptographic evidence, such as digital signatures, in order to support the settlement of possible electronic transaction disputes. It presents a systematic description of non-repudiation services, examples on the integration of these services into specific e-commerce applications, and a detailed analysis and comparison of typical non-repudiation mechanisms.


Author Notes

Jianying Zhou holds an M.Sc. in computer science from the Chinese Academy of Sciences and a Ph.D. in information security from the University of London.

Dr. Zhou is project manager at Kent Ridge Digital Labs in Singapore, where he leads an R&D team that develops network security technologies. He is actively involved in the academic world, serving on international conference committees and publishing papers for well-known journals.

050


Table of Contents

Prefacep. xiii
1 Introductionp. 1
1.1 Electronic Commerce and Securityp. 1
1.2 Repudiation and Dispute Resolutionp. 4
1.3 Non-repudiation and Network Securityp. 6
1.4 Non-repudiation in Message-Handling Systemsp. 8
1.5 Non-repudiation in Electronic Payment Systemsp. 10
1.6 Book Outlinep. 13
Referencesp. 15
2 Fundamentals of Non-repudiationp. 19
2.1 Goals of Non-repudiationp. 20
2.2 Non-repudiation Servicesp. 21
2.3 Non-repudiation Evidencep. 23
2.3.1 Types of Evidencep. 23
2.3.2 Elements of Evidencep. 24
2.3.3 Validity of Evidencep. 25
2.4 Roles of TTPsp. 26
2.4.1 Certification Authorityp. 27
2.4.2 Notaryp. 29
2.4.3 Delivery Authorityp. 29
2.4.4 Time-Stamping Authorityp. 30
2.4.5 Adjudicatorp. 30
2.5 Phases of Non-repudiationp. 31
2.5.1 Evidence Generationp. 31
2.5.2 Evidence Transferp. 32
2.5.3 Evidence Verification and Storagep. 32
2.5.4 Dispute Resolutionp. 33
2.6 Non-repudiation Policyp. 34
2.7 Requirements for Non-repudiationp. 35
2.7.1 Technical Infrastructurep. 35
2.7.2 Legal Frameworkp. 36
Referencesp. 37
3 Securing Digital Signatures for Non-repudiationp. 41
3.1 Security Requirements on Digital Signaturesp. 41
3.1.1 Non-repudiation Versus Authenticationp. 42
3.1.2 Device for Signature Generationp. 43
3.2 Timestamps in Digital Signaturesp. 44
3.2.1 Ordinary Timestampsp. 44
3.2.2 Trusted Timestampsp. 45
3.3 Securing TTP's Digital Signaturesp. 45
3.4 Time-Stamping Approachp. 46
3.5 Auditing Approachp. 47
3.6 One-Way Sequential Link Approachp. 48
3.6.1 Generation of a One-Way Sequential Linkp. 48
3.6.2 Termination of a One-Way Sequential Linkp. 50
3.6.3 Dispute Resolutionp. 51
3.7 Temporary Certificate Approachp. 53
3.7.1 Certificate Generationp. 53
3.7.2 Signature Generation and Verificationp. 54
3.7.3 Protection Against Key Compromisep. 55
3.7.4 Flexible Expiry Datep. 56
3.7.5 Dispute Resolutionp. 57
3.7.6 Security Analysisp. 58
3.8 Comparisonp. 59
3.8.1 Securityp. 59
3.8.2 TTP's Involvementp. 60
3.8.3 Computationp. 60
3.8.4 Storagep. 61
3.9 Summaryp. 62
Referencesp. 63
4 Achieving Fair Non-repudiationp. 65
4.1 Factors Against Fair Non-repudiationp. 65
4.2 Approaches to Fair Non-repudiationp. 68
4.2.1 Gradual Exchange Approachp. 69
4.2.2 Third-Party Approachp. 70
4.3 Protocol NR1: Using Lightweight Online TTPp. 71
4.3.1 Protocol Descriptionp. 72
4.3.2 Dispute Resolutionp. 74
4.3.3 Time Informationp. 75
4.3.4 Message Privacyp. 77
4.3.5 Evidence Chainingp. 78
4.4 Protocol NR2: Using Offline TTP Without Timely Terminationp. 80
4.4.1 Protocol Descriptionp. 81
4.4.2 Dispute Resolutionp. 82
4.4.3 Limitationp. 82
4.5 Protocol NR3: Using Offline TTP with Timely Terminationp. 84
4.5.1 Protocol Descriptionp. 84
4.5.2 Security Analysisp. 87
4.6 Protocol NR4: Using Inline TTP for Timely Deliveryp. 90
4.6.1 Evidence for Timely Message Transferp. 90
4.6.2 Protocol Descriptionp. 91
4.6.3 Dispute Resolutionp. 93
4.7 Summaryp. 94
Referencesp. 95
5 Related Work on Fair Non-repudiationp. 99
5.1 Protocols Using Inline TTPp. 99
5.1.1 Coffey-Saidha Protocolp. 99
5.1.2 Bahreman-Tygar Protocolp. 101
5.2 Protocols Using Online TTPp. 102
5.2.1 Deng-Gong-Lazar-Wang Protocolp. 102
5.2.2 Cox-Tygar-Sirbu Protocolp. 104
5.3 Protocols Using Offline TTPp. 106
5.3.1 Asokan-Schunter-Waidner Protocolp. 106
5.3.2 Bao-Deng-Mao Protocolp. 108
5.3.3 Asokan-Shoup-Waidner Protocolp. 110
5.4 Protocols with Probabilistic Fairnessp. 114
5.4.1 BenOr-Goldreich-Micali-Rivest Protocolp. 114
5.4.2 Olivier-Yves Protocolp. 117
5.5 Summaryp. 120
Referencesp. 122
6 ISO's Non-repudiation Mechanismsp. 125
6.1 Overview of ISO/IEC 13888p. 126
6.1.1 Part 1: Generalp. 126
6.1.2 Part 2: Mechanisms Using Symmetric Techniquesp. 127
6.1.3 Part 3: Mechanisms Using Asymmetric Techniquesp. 128
6.2 Mechanisms Using Symmetric Techniquesp. 128
6.2.1 M1: Mandatory NRO, Optional NRRp. 129
6.2.2 M2: Mandatory NRO and NRRp. 131
6.2.3 M3: Mandatory NRO and NRR with Intermediary TTPp. 132
6.3 Mechanisms Using Asymmetric Techniquesp. 134
6.4 Time-Stamping Evidencep. 135
6.5 Summaryp. 137
Referencesp. 137
7 Case Studiesp. 139
7.1 Non-repudiation in Electronic Paymentp. 139
7.1.1 Electronic Payment for Internet Lotteryp. 140
7.1.2 Internet Lottery Service Modelp. 142
7.1.3 Ticket Purchase Protocolp. 145
7.1.4 Winning Number Generation Protocolp. 148
7.1.5 Prize Claim Protocolp. 149
7.1.6 Security Analysisp. 151
7.2 Undeniable Billing in Mobile Communicationsp. 154
7.2.1 Security Requirements on Mobile Communicationsp. 155
7.2.2 Billing Model and Initial Assumptionsp. 156
7.2.3 Registration Protocolp. 158
7.2.4 Service Request Protocolp. 160
7.2.5 Undeniable Metering on Local Callsp. 161
7.2.6 Payment and Dispute Resolutionp. 162
7.2.7 Security and Performance Analysisp. 163
7.2.8 Related Workp. 166
7.3 Summaryp. 171
Referencesp. 172
8 Conclusionp. 175
Appendix Toward Formal Verification of Non-repudiationp. 181
A.1 The SVO Logicp. 182
A.2 Formalization of Non-repudiationp. 185
A.3 Verification of a Non-repudiation Protocolp. 186
A.4 Summaryp. 189
Referencesp. 190
About the Authorp. 191