Even S, Goldreich O, Lempel A. A randomized protocol for signing contracts[J]. Communication of the ACM, 1985, 28(6): 634-647.[2]Brickell E, Chaum D, Damgard I, Graaf J. Gradual and verifiable release of a secret[A]. Advances in Cryptology-Proceeding of CRYPT87[C] LNCS, Berlin, Springer-Verlag, 1988: 345-353.[3]ISO/IEC13888-2, Information technology-security techniques-non-repudiation-Part 2 Mechanisms using symmetric techniques (1998).[4]Zhou J, Gollmann D. Observations on non-repudiation[A]. Lecture Notes in Computer Science 1163, Advances in Cryptology: Proceedings of Asiacrypt96[C], Kyongju, Korea, Springer-Verlag,November 1996: 133-144.[5]蒋晓宁,叶澄清.电子证据与反拒认协议[J].通信学报,2000,21(7):76-81.[6]Zhou J, Gollmann D. A fair non-repudiation protocol[A]. Proceedings of 1996 IEEE Symposium on Security and Privacy [C], Oakland, California IEEE Computer Society Press, May, 1996:55-61.[7]Kim K.[J].Park S, Baek J. Improving fairness and privacy of Zhou Gollmanns fair non-repudiation protocol[A]. Proc. of 1999 ICPP Workshops on Security [C], IEEE Computer Society Wakamatsu,Japan, Sep 21-2.1999,:-
|