University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Formal Analysis of a Non-Repudiation Protocol.

Schneider, S (1998) Formal Analysis of a Non-Repudiation Protocol. In: IEEE Computer Security Foundations Workshop, 1998-06-09 - 1998-06-11, Rockport, MA, USA.

csfw98.pdf - Accepted version Manuscript
Available under License : See the attached licence file.

Download (223kB)
[img] Text (licence)

Download (1kB)


The paper applies the theory of communicating sequential processes (CSP) to the modelling and analysis of a non-repudiation protocol. Non-repudiation protocols differ from authentication and key-exchange protocols in that the participants require protection from each other, rather than from an external hostile agent. This means that the kinds of properties that are required of such a protocol, and the way it needs to be modelled to enable analysis, are different to the standard approaches taken to the more widely studied class of protocols and properties. A non-repudiation protocol proposed by Zhou and Gollmann (1996) is analysed within this framework, and this highlights some novel considerations that are required for this kind of protocol

Item Type: Conference or Workshop Item (Conference Paper)
Divisions : Faculty of Engineering and Physical Sciences > Computer Science
Authors : Schneider, S
Date : 1998
DOI : 10.1109/CSFW.1998.683155
Contributors :
ContributionNameEmailORCID Press,
Depositing User : Symplectic Elements
Date Deposited : 30 Sep 2011 14:15
Last Modified : 06 Jul 2019 05:08

Actions (login required)

View Item View Item


Downloads per month over past year

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800