ue 18(13): e2

Research Article

Approaching decentralized non-repudiation

Download958 downloads
  • @ARTICLE{10.4108/eai.12-1-2018.153559,
        author={H. Kamdem Fezeu and T. Djotio and R. Oulad Haj Thami},
        title={Approaching decentralized non-repudiation},
        journal={EAI Endorsed Transactions on Future Internet},
        keywords={Information Security, Internet of Things, Mesh Networks, Blockchain},
  • H. Kamdem Fezeu
    T. Djotio
    R. Oulad Haj Thami
    Year: 2018
    Approaching decentralized non-repudiation
    DOI: 10.4108/eai.12-1-2018.153559
H. Kamdem Fezeu1,*, T. Djotio1, R. Oulad Haj Thami2
  • 1: University of Yaounde I
  • 2: Mohammed V University
*Contact email: harry.kamdem@polytechnique.com


Securing data exchanges is a major preoccupation, and several techniques have been developed to reach that aim. The predominant model for such exchange is that which relies on trusted third-parties. Meanwhile, emerging technologies such as IoT are set to broadcast growing amounts of sensitive data, thereby making centralized architectures problematic for privacy and performance reasons and making decentralized networks ever more relevant. However, these third-parties play an important role in securing brokered communications and are essential in providing Authentication and Non-Repudiation according to current models, and cannot be used in peer-to-peer networks. Hence there is need for a simple model applicable in fully decentralized networks to provide Non-Repudiation. This document proposes such a model, presents an implementation and discusses its application, particularly in implementing irrefutable trustless transaction mechanisms – similar to blockchain – with limited resources.