Table of Contents

 1     Scope          
 2     References              
 3     Definitions
        3.1     Terms defined elsewhere      
        3.2     Terms defined in this Recommendation          
 4     Abbreviations and acronyms           
 5     Conventions            
 6     Overview of non-repudiation framework based on a one-time password 
        6.1     Introduction  
        6.2     Entities and keys         
        6.3     Secure envelope        
 
7     Security requirements for an OTP-based non-repudiation service
 8     Non-repudiation tokens    
        8.1     OTP-based non-repudiation of origin token (NROT)  
        8.2     OTP-based non-repudiation of delivery token (NRDT)             
 9     Non-repudiation processes              
        9.1     Process of OTP-based non-repudiation of origin (NRO)           
        9.2     Process of OTP-based non-repudiation of delivery (NRD)      
10     Non-repudiation service models  
       10.1     Overview of the communication models       
       10.2     Service model for indirect NROT and indirect NRDT  
       10.3     Service model for indirect NROT and direct NRDT      
       10.4     Service model for direct NROT and indirect NRDT      
       10.5     Service model for direct NROT and direct NRDT         
Bibliography