Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Optimistic Non-repudiation Protocol Analysis

Identifieur interne : 002608 ( Istex/Corpus ); précédent : 002607; suivant : 002609

Optimistic Non-repudiation Protocol Analysis

Auteurs : Judson Santiago ; Laurent Vigneron

Source :

RBID : ISTEX:A1952B1A2DAB80E16EF6A211E90D280F20381B21

Abstract

Abstract: Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis method, show two attack traces that exploit the fault and propose a correction to the protocol.

Url:
DOI: 10.1007/978-3-540-72354-7_8

Links to Exploration step

ISTEX:A1952B1A2DAB80E16EF6A211E90D280F20381B21

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Optimistic Non-repudiation Protocol Analysis</title>
<author>
<name sortKey="Santiago, Judson" sort="Santiago, Judson" uniqKey="Santiago J" first="Judson" last="Santiago">Judson Santiago</name>
<affiliation>
<mods:affiliation>LORIA – Nancy Université,  </mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Vigneron, Laurent" sort="Vigneron, Laurent" uniqKey="Vigneron L" first="Laurent" last="Vigneron">Laurent Vigneron</name>
<affiliation>
<mods:affiliation>LORIA – Nancy Université,  </mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: laurent.vigneron@loria.fr</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:A1952B1A2DAB80E16EF6A211E90D280F20381B21</idno>
<date when="2007" year="2007">2007</date>
<idno type="doi">10.1007/978-3-540-72354-7_8</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-CJ8D9CN0-C/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002608</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">002608</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Optimistic Non-repudiation Protocol Analysis</title>
<author>
<name sortKey="Santiago, Judson" sort="Santiago, Judson" uniqKey="Santiago J" first="Judson" last="Santiago">Judson Santiago</name>
<affiliation>
<mods:affiliation>LORIA – Nancy Université,  </mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Vigneron, Laurent" sort="Vigneron, Laurent" uniqKey="Vigneron L" first="Laurent" last="Vigneron">Laurent Vigneron</name>
<affiliation>
<mods:affiliation>LORIA – Nancy Université,  </mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: laurent.vigneron@loria.fr</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<title level="s" type="abbrev">LNCS</title>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis method, show two attack traces that exploit the fault and propose a correction to the protocol.</div>
</front>
</TEI>
<istex>
<corpusName>springer-ebooks</corpusName>
<author>
<json:item>
<name>Judson Santiago</name>
<affiliations>
<json:string>LORIA – Nancy Université,</json:string>
</affiliations>
</json:item>
<json:item>
<name>Laurent Vigneron</name>
<affiliations>
<json:string>LORIA – Nancy Université,</json:string>
<json:string>E-mail: laurent.vigneron@loria.fr</json:string>
</affiliations>
</json:item>
</author>
<arkIstex>ark:/67375/HCB-CJ8D9CN0-C</arkIstex>
<language>
<json:string>eng</json:string>
</language>
<originalGenre>
<json:string>OriginalPaper</json:string>
</originalGenre>
<abstract>Abstract: Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis method, show two attack traces that exploit the fault and propose a correction to the protocol.</abstract>
<qualityIndicators>
<score>7.888</score>
<pdfWordCount>5133</pdfWordCount>
<pdfCharCount>27068</pdfCharCount>
<pdfVersion>1.3</pdfVersion>
<pdfPageCount>12</pdfPageCount>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<abstractWordCount>74</abstractWordCount>
<abstractCharCount>500</abstractCharCount>
<keywordCount>0</keywordCount>
</qualityIndicators>
<title>Optimistic Non-repudiation Protocol Analysis</title>
<chapterId>
<json:string>8</json:string>
<json:string>Chap8</json:string>
</chapterId>
<genre>
<json:string>conference</json:string>
</genre>
<serie>
<title>Lecture Notes in Computer Science</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>2007</copyrightDate>
<issn>
<json:string>0302-9743</json:string>
</issn>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<editor>
<json:item>
<name>David Hutchison</name>
</json:item>
<json:item>
<name>Takeo Kanade</name>
</json:item>
<json:item>
<name>Josef Kittler</name>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
</json:item>
<json:item>
<name>John C. Mitchell</name>
</json:item>
<json:item>
<name>Moni Naor</name>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
</json:item>
<json:item>
<name>Madhu Sudan</name>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
</json:item>
<json:item>
<name>Doug Tygar</name>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
</json:item>
</editor>
</serie>
<host>
<title>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>2007</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-72354-7</json:string>
</doi>
<issn>
<json:string>0302-9743</json:string>
</issn>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<eisbn>
<json:string>978-3-540-72354-7</json:string>
</eisbn>
<bookId>
<json:string>978-3-540-72354-7</json:string>
</bookId>
<isbn>
<json:string>978-3-540-72353-0</json:string>
</isbn>
<volume>4462</volume>
<pages>
<first>90</first>
<last>101</last>
</pages>
<genre>
<json:string>book-series</json:string>
</genre>
<editor>
<json:item>
<name>Damien Sauveron</name>
</json:item>
<json:item>
<name>Konstantinos Markantonakis</name>
</json:item>
<json:item>
<name>Angelos Bilas</name>
</json:item>
<json:item>
<name>Jean-Jacques Quisquater</name>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Data Encryption</value>
</json:item>
<json:item>
<value>Systems and Data Security</value>
</json:item>
<json:item>
<value>Computer Communication Networks</value>
</json:item>
<json:item>
<value>Management of Computing and Information Systems</value>
</json:item>
<json:item>
<value>Computers and Society</value>
</json:item>
</subject>
</host>
<ark>
<json:string>ark:/67375/HCB-CJ8D9CN0-C</json:string>
</ark>
<publicationDate>2007</publicationDate>
<copyrightDate>2007</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-72354-7_8</json:string>
</doi>
<id>A1952B1A2DAB80E16EF6A211E90D280F20381B21</id>
<score>1</score>
<fulltext>
<json:item>
<extension>pdf</extension>
<original>true</original>
<mimetype>application/pdf</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-CJ8D9CN0-C/fulltext.pdf</uri>
</json:item>
<json:item>
<extension>zip</extension>
<original>false</original>
<mimetype>application/zip</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-CJ8D9CN0-C/bundle.zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/ark:/67375/HCB-CJ8D9CN0-C/fulltext.tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Optimistic Non-repudiation Protocol Analysis</title>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<availability>
<licence>Springer Berlin Heidelberg</licence>
</availability>
<date when="2007">2007</date>
</publicationStmt>
<notesStmt>
<note type="conference" source="proceedings" scheme="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</note>
<note type="publication-type" subtype="book-series" scheme="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</note>
</notesStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Optimistic Non-repudiation Protocol Analysis</title>
<author>
<persName>
<forename type="first">Judson</forename>
<surname>Santiago</surname>
</persName>
<affiliation>
<orgName type="institution">LORIA – Nancy Université</orgName>
<address>
<country key=""></country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Laurent</forename>
<surname>Vigneron</surname>
</persName>
<email>laurent.vigneron@loria.fr</email>
<affiliation>
<orgName type="institution">LORIA – Nancy Université</orgName>
<address>
<country key=""></country>
</address>
</affiliation>
</author>
<idno type="istex">A1952B1A2DAB80E16EF6A211E90D280F20381B21</idno>
<idno type="ark">ark:/67375/HCB-CJ8D9CN0-C</idno>
<idno type="DOI">10.1007/978-3-540-72354-7_8</idno>
</analytic>
<monogr>
<title level="m" type="main">Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems</title>
<title level="m" type="sub">First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings</title>
<title level="m" type="part">Cryptography Scheme</title>
<idno type="DOI">10.1007/978-3-540-72354-7</idno>
<idno type="book-id">978-3-540-72354-7</idno>
<idno type="ISBN">978-3-540-72353-0</idno>
<idno type="eISBN">978-3-540-72354-7</idno>
<idno type="chapter-id">Chap8</idno>
<idno type="part-id">Part4</idno>
<editor>
<persName>
<forename type="first">Damien</forename>
<surname>Sauveron</surname>
</persName>
<email>damien.sauveron@xlim.fr</email>
</editor>
<editor>
<persName>
<forename type="first">Konstantinos</forename>
<surname>Markantonakis</surname>
</persName>
<email>k.markantonakis@rhul.ac.uk</email>
</editor>
<editor>
<persName>
<forename type="first">Angelos</forename>
<surname>Bilas</surname>
</persName>
<email>bilas@csd.uoc.gr</email>
</editor>
<editor>
<persName>
<forename type="first">Jean-Jacques</forename>
<surname>Quisquater</surname>
</persName>
<email>quisquater@dice.ucl.ac.be</email>
</editor>
<imprint>
<biblScope unit="vol">4462</biblScope>
<biblScope unit="page" from="90">90</biblScope>
<biblScope unit="page" to="101">101</biblScope>
<biblScope unit="chapter-count">20</biblScope>
<biblScope unit="part-chapter-count">4</biblScope>
</imprint>
</monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<title level="s" type="abbrev">LNCS</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<forename type="first">Pandu</forename>
<surname>Rangan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Doug</forename>
<surname>Tygar</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
</editor>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="seriesID">558</idno>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<abstract xml:lang="en">
<head>Abstract</head>
<p>Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis method, show two attack traces that exploit the fault and propose a correction to the protocol.</p>
</abstract>
<textClass ana="subject">
<keywords scheme="book-subject-collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass ana="subject">
<keywords scheme="book-subject">
<list>
<label>I</label>
<item>
<term type="Primary">Computer Science</term>
</item>
<label>I15033</label>
<item>
<term type="Secondary" subtype="priority-1">Data Encryption</term>
</item>
<label>I14050</label>
<item>
<term type="Secondary" subtype="priority-2">Systems and Data Security</term>
</item>
<label>I13022</label>
<item>
<term type="Secondary" subtype="priority-3">Computer Communication Networks</term>
</item>
<label>I24067</label>
<item>
<term type="Secondary" subtype="priority-4">Management of Computing and Information Systems</term>
</item>
<label>I24040</label>
<item>
<term type="Secondary" subtype="priority-5">Computers and Society</term>
</item>
</list>
</keywords>
</textClass>
<langUsage>
<language ident="EN"></language>
</langUsage>
</profileDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<extension>txt</extension>
<original>false</original>
<mimetype>text/plain</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-CJ8D9CN0-C/fulltext.txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="corpus springer-ebooks not found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
<SeriesAbbreviatedTitle>LNCS</SeriesAbbreviatedTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<GivenName>Pandu</GivenName>
<FamilyName>Rangan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Doug</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingStyle="Unnumbered" OutputMedium="All" TocLevels="0">
<BookID>978-3-540-72354-7</BookID>
<BookTitle>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems</BookTitle>
<BookSubTitle>First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings</BookSubTitle>
<BookVolumeNumber>4462</BookVolumeNumber>
<BookSequenceNumber>4462</BookSequenceNumber>
<BookDOI>10.1007/978-3-540-72354-7</BookDOI>
<BookTitleID>149520</BookTitleID>
<BookPrintISBN>978-3-540-72353-0</BookPrintISBN>
<BookElectronicISBN>978-3-540-72354-7</BookElectronicISBN>
<BookChapterCount>20</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2007</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I15033" Priority="1" Type="Secondary">Data Encryption</BookSubject>
<BookSubject Code="I14050" Priority="2" Type="Secondary">Systems and Data Security</BookSubject>
<BookSubject Code="I13022" Priority="3" Type="Secondary">Computer Communication Networks</BookSubject>
<BookSubject Code="I24067" Priority="4" Type="Secondary">Management of Computing and Information Systems</BookSubject>
<BookSubject Code="I24040" Priority="5" Type="Secondary">Computers and Society</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Damien</GivenName>
<FamilyName>Sauveron</FamilyName>
</EditorName>
<Contact>
<Email>damien.sauveron@xlim.fr</Email>
</Contact>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Konstantinos</GivenName>
<FamilyName>Markantonakis</FamilyName>
</EditorName>
<Contact>
<Email>k.markantonakis@rhul.ac.uk</Email>
</Contact>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Angelos</GivenName>
<FamilyName>Bilas</FamilyName>
</EditorName>
<Contact>
<Email>bilas@csd.uoc.gr</Email>
</Contact>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Jean-Jacques</GivenName>
<FamilyName>Quisquater</FamilyName>
</EditorName>
<Contact>
<Email>quisquater@dice.ucl.ac.be</Email>
</Contact>
</Editor>
</EditorGroup>
</BookHeader>
<Part ID="Part4">
<PartInfo TocLevels="0">
<PartID>4</PartID>
<PartSequenceNumber>4</PartSequenceNumber>
<PartTitle>Cryptography Scheme</PartTitle>
<PartChapterCount>4</PartChapterCount>
</PartInfo>
<Chapter ID="Chap8" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingStyle="Unnumbered" TocLevels="0">
<ChapterID>8</ChapterID>
<ChapterDOI>10.1007/978-3-540-72354-7_8</ChapterDOI>
<ChapterSequenceNumber>8</ChapterSequenceNumber>
<ChapterTitle Language="En">Optimistic Non-repudiation Protocol Analysis</ChapterTitle>
<ChapterFirstPage>90</ChapterFirstPage>
<ChapterLastPage>101</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2007</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Judson</GivenName>
<FamilyName>Santiago</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Laurent</GivenName>
<FamilyName>Vigneron</FamilyName>
</AuthorName>
<Contact>
<Email>laurent.vigneron@loria.fr</Email>
</Contact>
</Author>
<Affiliation ID="Aff1">
<OrgName>LORIA – Nancy Université</OrgName>
<OrgAddress>
<Country> </Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis method, show two attack traces that exploit the fault and propose a correction to the protocol.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Optimistic Non-repudiation Protocol Analysis</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA">
<title>Optimistic Non-repudiation Protocol Analysis</title>
</titleInfo>
<name type="personal">
<namePart type="given">Judson</namePart>
<namePart type="family">Santiago</namePart>
<affiliation>LORIA – Nancy Université,  </affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Laurent</namePart>
<namePart type="family">Vigneron</namePart>
<affiliation>LORIA – Nancy Université,  </affiliation>
<affiliation>E-mail: laurent.vigneron@loria.fr</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre displayLabel="OriginalPaper" authority="ISTEX" authorityURI="https://content-type.data.istex.fr" type="conference" valueURI="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2007</dateIssued>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<abstract lang="en">Abstract: Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis method, show two attack traces that exploit the fault and propose a correction to the protocol.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems</title>
<subTitle>First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Damien</namePart>
<namePart type="family">Sauveron</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Konstantinos</namePart>
<namePart type="family">Markantonakis</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Angelos</namePart>
<namePart type="family">Bilas</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jean-Jacques</namePart>
<namePart type="family">Quisquater</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="book-series" authority="ISTEX" authorityURI="https://publication-type.data.istex.fr" valueURI="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</genre>
<originInfo>
<publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book-Subject-Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book-Subject-Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I15033">Data Encryption</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14050">Systems and Data Security</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13022">Computer Communication Networks</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24067">Management of Computing and Information Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24040">Computers and Society</topic>
</subject>
<identifier type="DOI">10.1007/978-3-540-72354-7</identifier>
<identifier type="ISBN">978-3-540-72353-0</identifier>
<identifier type="eISBN">978-3-540-72354-7</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">149520</identifier>
<identifier type="BookID">978-3-540-72354-7</identifier>
<identifier type="BookChapterCount">20</identifier>
<identifier type="BookVolumeNumber">4462</identifier>
<identifier type="BookSequenceNumber">4462</identifier>
<identifier type="PartChapterCount">4</identifier>
<part>
<date>2007</date>
<detail type="part">
<title>Cryptography Scheme</title>
</detail>
<detail type="volume">
<number>4462</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>90</start>
<end>101</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="given">Pandu</namePart>
<namePart type="family">Rangan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Doug</namePart>
<namePart type="family">Tygar</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">A1952B1A2DAB80E16EF6A211E90D280F20381B21</identifier>
<identifier type="ark">ark:/67375/HCB-CJ8D9CN0-C</identifier>
<identifier type="DOI">10.1007/978-3-540-72354-7_8</identifier>
<identifier type="ChapterID">8</identifier>
<identifier type="ChapterID">Chap8</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 2007</accessCondition>
<recordInfo>
<recordContentSource authority="ISTEX" authorityURI="https://loaded-corpus.data.istex.fr" valueURI="https://loaded-corpus.data.istex.fr/ark:/67375/XBH-RLRX46XW-4">springer</recordContentSource>
<recordOrigin>Springer Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</mods>
<json:item>
<extension>json</extension>
<original>false</original>
<mimetype>application/json</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-CJ8D9CN0-C/record.json</uri>
</json:item>
</metadata>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 002608 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 002608 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:A1952B1A2DAB80E16EF6A211E90D280F20381B21
   |texte=   Optimistic Non-repudiation Protocol Analysis
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022