A Non-Repudiation E-Mail Transmission Protocol and its Formal Analysis

Article Preview

Abstract:

In order to reduce the amount of data exchange in E-mail transmission process, a non-repudiation E-mail transmission protocol was proposed based on the digital signature technology. By using the formal analysis based on the extended strand space method, strict authentication and analysis were conducted for the security of data transmission and the identity of both the transmitter and receiver. Furthermore, the safety and effectiveness of this protocol were verified.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

984-988

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] D. Dolev, A. Yao: Technical Report ( No. STAN-CS-81-854, Dept. of Computer Science, Stanford University, May, 1981).

Google Scholar

[2] Jiafen Liu, in: Research on Authentication Test Theory in Formal Analysis of Security Protocols (University of Electronic Science and Technology of China, Chengdu, 2008).

Google Scholar

[3] Thayer F, Herzog J, Guttmann J, in: Proceedings of the 1998 IEEE Symposium on Security and Privacy, (1998), pp.160-171.

Google Scholar

[4] Thayer F, Herzog J, Guttmann J, in: Proceedings of the 11th IEEE computer security Foundations Workshop (IEEE Computer Society Press, June 1998).

Google Scholar

[5] Joshua D, Guttmann J, Thayer F, in: Proceedings of the 2000 IEEE Symposium on Security and Privacy (IEEE Computer Society Press, 2000, pp.96-109).

Google Scholar

[6] Even S, Goldreich O, Lempel A: Communications of the ACM, Vol. 28(1985), pp.637-647 (In Chinese).

Google Scholar

[7] Sihan Qing: Journal of Software, Vol. 11(2000), pp.1338-1343 (In Chinese).

Google Scholar

[8] Yong-quan Cai, Zhu Yong: Research of Computer Application, Vol. 24(2007), pp.222-245 (In Chinese).

Google Scholar