Title :
Formal analysis of a non-repudiation protocol
Author :
Schneider, Steve
Author_Institution :
Dept. of Comput. Sci., R. Holloway & Bedford New Coll., Egham, UK
Abstract :
The paper applies the theory of communicating sequential processes (CSP) to the modelling and analysis of a non-repudiation protocol. Non-repudiation protocols differ from authentication and key-exchange protocols in that the participants require protection from each other, rather than from an external hostile agent. This means that the kinds of properties that are required of such a protocol, and the way it needs to be modelled to enable analysis, are different to the standard approaches taken to the more widely studied class of protocols and properties. A non-repudiation protocol proposed by Zhou and Gollmann (1996) is analysed within this framework, and this highlights some novel considerations that are required for this kind of protocol
Keywords :
communicating sequential processes; protocols; security of data; communicating sequential processes; formal analysis; nonrepudiation protocol; protection; Authentication; Context; Protection; Protocols; Safety; Security;
Conference_Titel :
Computer Security Foundations Workshop, 1998. Proceedings. 11th IEEE
Conference_Location :
Rockport, MA
Print_ISBN :
0-8186-8488-7
DOI :
10.1109/CSFW.1998.683155