Title : 
Formal analysis of a non-repudiation protocol
         
        
            Author : 
Schneider, Steve
         
        
            Author_Institution : 
Dept. of Comput. Sci., R. Holloway & Bedford New Coll., Egham, UK
         
        
        
        
        
        
            Abstract : 
The paper applies the theory of communicating sequential processes (CSP) to the modelling and analysis of a non-repudiation protocol. Non-repudiation protocols differ from authentication and key-exchange protocols in that the participants require protection from each other, rather than from an external hostile agent. This means that the kinds of properties that are required of such a protocol, and the way it needs to be modelled to enable analysis, are different to the standard approaches taken to the more widely studied class of protocols and properties. A non-repudiation protocol proposed by Zhou and Gollmann (1996) is analysed within this framework, and this highlights some novel considerations that are required for this kind of protocol
         
        
            Keywords : 
communicating sequential processes; protocols; security of data; communicating sequential processes; formal analysis; nonrepudiation protocol; protection; Authentication; Context; Protection; Protocols; Safety; Security;
         
        
        
        
            Conference_Titel : 
Computer Security Foundations Workshop, 1998. Proceedings. 11th IEEE
         
        
            Conference_Location : 
Rockport, MA
         
        
        
            Print_ISBN : 
0-8186-8488-7
         
        
        
            DOI : 
10.1109/CSFW.1998.683155