How to achieve non-repudiation of origin with privacy protection in cloud computing

作者:

Highlights:

• We define two security goals of the non-repudiation of origin: NRO-I and NRO-II.

• We show that the (strongly) existential unforgeability of digital signatures is not sufficient to provide NRO-II.

• We define the privacy of message sender in communication protocols with non-repudiation of origin.

• We describe a communication protocol where the non-repudiation of origin and the privacy of message originator co-exist.

摘要

•We define two security goals of the non-repudiation of origin: NRO-I and NRO-II.•We show that the (strongly) existential unforgeability of digital signatures is not sufficient to provide NRO-II.•We define the privacy of message sender in communication protocols with non-repudiation of origin.•We describe a communication protocol where the non-repudiation of origin and the privacy of message originator co-exist.

论文关键词:Security,Non-repudiation,Privacy,Protocol

论文评审过程:Received 16 December 2011, Revised 11 April 2012, Accepted 22 February 2013, Available online 26 March 2013.

论文官网地址:https://doi.org/10.1016/j.jcss.2013.03.001