Delegated non-repudiation architecture based on ITU-T X.813 |
|
Non-repudiation is the ability to prevent entities from denying that they have sent or received electronic transaction data in a telecommunication network. Recommendation ITU-T X.1159 provides a delegated non-repudiation architecture based on Recommendation ITU-T X.813 to generate non-repudiation evidence by a trusted third party (TTP) instead of a user.
Recommendation ITU-T X.813 defines six non-repudiation mechanisms: a TTP security token, security tokens and tamper-resistant modules, a digital signature, time stamping, an in-line TTP and a notary. This Recommendation complies with these six mechanisms, and the non-repudiation service can use a combination of these mechanisms to satisfy the security requirements of the application service.
In this Recommendation, a right and/or user's signing key for a non-repudiation generation delegates to a TTP, which is a central signing authority, and the central signing authority generates and verifies non-repudiation evidence using the delegated user's signing/validation key or the central signing authority's secret key/validation key. The delegated non-repudiation model in this Recommendation is capable of responding to key loss and theft, is safe in an open network, such as a mobile and cloud network, and provides convenient non-repudiation service.
This Recommendation describes the delegated non-repudiation service models and operations for each of the service models. The architecture also defines the security requirements of the delegated non-repudiation service. In this delegated non-repudiation service model, there are two types of service models that use the central signing authority's secret key and the delegated signing key. |
|
Citation: |
https://handle.itu.int/11.1002/1000/12342 |
Series title: |
X series: Data networks, open system communications and security X.1100-X.1199: Secure applications and services (I) X.1150-X.1159: Application Security (I) |
Approval date: |
2014-11-13 |
Provisional name: | X.sap-9 |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1159 (11/2014)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|