• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Peng Hongyan, Li Xiaojian, Xia Chunhe, Deng Jianfeng, Zhou Xiaofa. A Non-Repudiation Protocol for E-Mail and Its Formal Analysis[J]. Journal of Computer Research and Development, 2006, 43(11): 1914-1919.
Citation: Peng Hongyan, Li Xiaojian, Xia Chunhe, Deng Jianfeng, Zhou Xiaofa. A Non-Repudiation Protocol for E-Mail and Its Formal Analysis[J]. Journal of Computer Research and Development, 2006, 43(11): 1914-1919.

A Non-Repudiation Protocol for E-Mail and Its Formal Analysis

More Information
  • Published Date: November 14, 2006
  • There are different goals in a non-repudiation protocol to be considered for different application. However, there are some goals to be considered in a non-repudiation protocol for E-mail: non-repudiation of both parties; fairness to both message sender and message receiver with respective to their control over the completion of a transaction; the degree of trust on a third party; keeping E-mail confidentiality; and decreasing the number of interaction. In this paper, a new non-repudiation protocol for E-mail is proposed for resolving the existent problems: unfairness, confidentiality not well protected, and many numbers of interaction by using formal analysis, and the new protocol is proven to be able to provide non-repudiation of sender and receiver, fairness and validity of evidence.
  • Related Articles

    [1]Jiao Pengfei, Chen Shuxin, Guo Xuan, He Dongxiao, Liu Dong. Survey on Graph Neural Ordinary Differential Equations[J]. Journal of Computer Research and Development, 2024, 61(8): 2045-2066. DOI: 10.7544/issn1000-1239.202440192
    [2]Han Songshen, Guo Songhui, Xu Kaiyong, Yang Bo, Yu Miao. Perturbation Analysis of the Vital Region in Speech Adversarial Example Based on Frame Structure[J]. Journal of Computer Research and Development, 2024, 61(3): 685-700. DOI: 10.7544/issn1000-1239.202221034
    [3]Shen Yijie, Li Liangcheng, Liu Ziwei, Liu Tiantian, Luo Hao, Shen Ting, Lin Feng, Ren Kui. Stealthy Attack Towards Speaker Recognition Based on One-“Audio Pixel” Perturbation[J]. Journal of Computer Research and Development, 2021, 58(11): 2350-2363. DOI: 10.7544/issn1000-1239.2021.20210632
    [4]Meng Yinfeng, Liang Jiye. Linear Regularized Functional Logistic Model[J]. Journal of Computer Research and Development, 2020, 57(8): 1617-1626. DOI: 10.7544/issn1000-1239.2020.20200496
    [5]Feng Da, Zhou Fucai, Wang Qiang, Wu Qiyu. Efficient Verifiable Outsourcing of Solving Large-Scale Linear Equations with Low Storage Overhead[J]. Journal of Computer Research and Development, 2019, 56(5): 1123-1131. DOI: 10.7544/issn1000-1239.2019.20180191
    [6]WuTao, JinJianguo, WeiMingjun. A Hash Function Algorithm Based on Variable Parameter Cascade Chaos[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681. DOI: 10.7544/issn1000-1239.2016.20148155
    [7]Cui Zhen, Shan Shiguang, Chen Xilin. Structured Sparse Linear Discriminant Analysis[J]. Journal of Computer Research and Development, 2014, 51(10): 2295-2301. DOI: 10.7544/issn1000-1239.2014.20130188
    [8]Feng Lin, Liu Shenglan, Zhang Jing, and Wang Huibing. Robust Activation Function of Extreme Learning Machine and Linear Dimensionality Reduction in High-Dimensional Data[J]. Journal of Computer Research and Development, 2014, 51(6): 1331-1340.
    [9]Li Shengmei, Cheng Buqi, Gao Xingyu, Qiao Lin, Tang Zhizhong. A Method on Analyzing Performance Sensitivity of Applications Based on Partial Derivatives of Non-linear Regression Equation[J]. Journal of Computer Research and Development, 2010, 47(9): 1654-1662.
    [10]Wu Jiying and Ruan Qiuqi. A Curvature-Driven Image Inpainting Model Based on Helmholtz Vorticity Equation[J]. Journal of Computer Research and Development, 2007, 44(5): 860-866.

Catalog

    Article views (862) PDF downloads (647) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return