WO2001030016A3 - A method for non-repudiation using a trusted third party - Google Patents

A method for non-repudiation using a trusted third party Download PDF

Info

Publication number
WO2001030016A3
WO2001030016A3 PCT/US2000/027069 US0027069W WO0130016A3 WO 2001030016 A3 WO2001030016 A3 WO 2001030016A3 US 0027069 W US0027069 W US 0027069W WO 0130016 A3 WO0130016 A3 WO 0130016A3
Authority
WO
WIPO (PCT)
Prior art keywords
repudiation
session key
sender
sub
recipient
Prior art date
Application number
PCT/US2000/027069
Other languages
French (fr)
Other versions
WO2001030016A2 (en
Inventor
Chunru Zhang
Ming Cai
Original Assignee
Ecomxml Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ecomxml Inc filed Critical Ecomxml Inc
Priority to AU77451/00A priority Critical patent/AU7745100A/en
Priority to CA002386502A priority patent/CA2386502A1/en
Publication of WO2001030016A2 publication Critical patent/WO2001030016A2/en
Publication of WO2001030016A3 publication Critical patent/WO2001030016A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)

Abstract

A protocol for prohibiting non-repudiation by transacting parties involved in an executed electronic transaction, whereby a trusted third party is responsible for ensuring non-repudiation. In this protocol, a sender uses a secret sharing technology to divide the original session key into a first sub-session key and a second sub-session key. The first and second sub-session keys must be combined into the original session key in order for a recipient to decrypt a product that is encrypted with the original session key. The sender includes the first sub-session key that is encrypted with a recipient's public key and an encrypted product in a first message. Then the sender transmits the first message to the recipient. The recipient uses the first message as evidence of non-repudiation of origin, i.e., evidence of non-repudiation that the sender sent the transaction. The recipient transmits, to the sender, a second message requesting the second sub-session key. The sender may use the second message as evidence of non-repudiation of receipt, i.e., evidence of non-repudiation that the recipient received the transaction. Thereafter, the sender includes the second sub-session key which is encrypted with the trusted third party's public key in a third message that is forwarded to the trusted third party.
PCT/US2000/027069 1999-10-01 2000-10-02 A method for non-repudiation using a trusted third party WO2001030016A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU77451/00A AU7745100A (en) 1999-10-01 2000-10-02 A method for prohibiting transacting parties from subsequently repudiating an executed transaction with trusted third party
CA002386502A CA2386502A1 (en) 1999-10-01 2000-10-02 A method for non-repudiation using a trusted third party

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US41100499A 1999-10-01 1999-10-01
US09/411,004 1999-10-01

Publications (2)

Publication Number Publication Date
WO2001030016A2 WO2001030016A2 (en) 2001-04-26
WO2001030016A3 true WO2001030016A3 (en) 2001-12-13

Family

ID=23627160

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/027069 WO2001030016A2 (en) 1999-10-01 2000-10-02 A method for non-repudiation using a trusted third party

Country Status (4)

Country Link
AU (1) AU7745100A (en)
CA (1) CA2386502A1 (en)
TW (1) TW545021B (en)
WO (1) WO2001030016A2 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001069843A2 (en) * 2000-03-10 2001-09-20 Absolutefuture, Inc. Method and system for coordinating secure transmission of information
AUPS169002A0 (en) * 2002-04-11 2002-05-16 Tune, Andrew Dominic An information storage system
JP4213664B2 (en) * 2002-06-12 2009-01-21 テレフオンアクチーボラゲット エル エム エリクソン(パブル) Non-repudiation of service agreement
US7568106B2 (en) 2005-12-16 2009-07-28 International Business Machines Corporation Cooperative non-repudiated message exchange in a network environment
JP2008259077A (en) * 2007-04-06 2008-10-23 N-Crypt Lab Inc Transmission and reception system, transmitting device, receiving device, method performed by them, and program
US8726009B1 (en) * 2010-01-26 2014-05-13 David P. Cook Secure messaging using a trusted third party
KR101393159B1 (en) 2013-04-10 2014-05-30 숭실대학교산학협력단 Method and apparatus for controlling access based on key in social network service
CN104463451B (en) * 2014-11-28 2018-05-18 中国建设银行股份有限公司 A kind of sales slip management system and correlation technique
US9654294B2 (en) 2015-02-26 2017-05-16 Red Hat, Inc. Non-repudiable atomic commit
US9886573B2 (en) 2015-08-06 2018-02-06 Red Hat, Inc. Non-repudiation of broadcast messaging
US10228967B2 (en) 2016-06-01 2019-03-12 Red Hat, Inc. Non-repudiable transaction protocol

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HERDA S: "Non-repudiation: Constituting evidence and proof in digital cooperation", COMPUTER STANDARDS AND INTERFACES,CH,ELSEVIER SEQUOIA. LAUSANNE, vol. 17, no. 1, 1995, pages 69 - 79, XP004046750, ISSN: 0920-5489 *
ZHOU J ET AL: "A FAIR NON-REPUDIATION PROTOCOL", PROCEEDINGS OF THE IEEE SYMPOSIUM ON SECURITY AND PRIVACY,US,LOS ALAMITOS, IEEE COMP. SOC. PRESS, vol. SYMP. 17, 6 May 1996 (1996-05-06), pages 55 - 61, XP000634833, ISBN: 0-7803-3527-9 *

Also Published As

Publication number Publication date
TW545021B (en) 2003-08-01
AU7745100A (en) 2001-04-30
CA2386502A1 (en) 2001-04-26
WO2001030016A2 (en) 2001-04-26

Similar Documents

Publication Publication Date Title
AU2002252034A1 (en) System and method for message encryption and signing in a transaction processing system
WO2005040975A3 (en) Identity-based-encryption system with district policy information
EP0807911A3 (en) Client/server protocol for proving authenticity
WO2001078491A3 (en) Systems and methods for encrypting/decrypting data using a broker agent
AU1240499A (en) Security of data connections
WO2001097432A3 (en) Secure messaging system with return receipts
WO2008003579A3 (en) Method and program product for securing privacy of an e-mail address in an e-mail
CA2278670A1 (en) Encryption and decryption method and apparatus
WO2002032044A3 (en) Secret key messaging
WO2000033506A8 (en) Public key cryptosystem with roaming user capability
WO2002101974A8 (en) Secure ephemeral decryptability
WO2004047352A3 (en) Identity-based encryption system
CA2224661A1 (en) Use of an encryption server for encrypting messages
WO2006007601A3 (en) Secure messaging system with derived keys
WO2007123895A3 (en) Privacy enhanced identity scheme using an un-linkable identifier
WO2005065358A3 (en) E-mail certification service
GB2444445B (en) Secure data transmission
TW431108B (en) Method for establishing a key using over-the-air communication and password protocol and password protocol
EP0841770A3 (en) Method for sending a secure message in a telecommunications system
HK1016377A1 (en) System and method for ensuring user privacy in network communications
WO2003081377A3 (en) Methods of exchanging secure messages
HK1099863A1 (en) System and method for securing data
WO2006086721A3 (en) Context limited shared secret
MY166025A (en) Pseudo-secret key generation in a communications system
JP2003008565A5 (en)

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

WWE Wipo information: entry into national phase

Ref document number: 2386502

Country of ref document: CA

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP