Research Article
Approaching decentralized non-repudiation
@ARTICLE{10.4108/eai.12-1-2018.153559, author={H. Kamdem Fezeu and T. Djotio and R. Oulad Haj Thami}, title={Approaching decentralized non-repudiation}, journal={EAI Endorsed Transactions on Future Internet}, volume={4}, number={13}, publisher={EAI}, journal_a={UE}, year={2018}, month={1}, keywords={Information Security, Internet of Things, Mesh Networks, Blockchain}, doi={10.4108/eai.12-1-2018.153559} }
- H. Kamdem Fezeu
T. Djotio
R. Oulad Haj Thami
Year: 2018
Approaching decentralized non-repudiation
UE
EAI
DOI: 10.4108/eai.12-1-2018.153559
Abstract
Securing data exchanges is a major preoccupation, and several techniques have been developed to reach that aim. The predominant model for such exchange is that which relies on trusted third-parties. Meanwhile, emerging technologies such as IoT are set to broadcast growing amounts of sensitive data, thereby making centralized architectures problematic for privacy and performance reasons and making decentralized networks ever more relevant. However, these third-parties play an important role in securing brokered communications and are essential in providing Authentication and Non-Repudiation according to current models, and cannot be used in peer-to-peer networks. Hence there is need for a simple model applicable in fully decentralized networks to provide Non-Repudiation. This document proposes such a model, presents an implementation and discusses its application, particularly in implementing irrefutable trustless transaction mechanisms – similar to blockchain – with limited resources.
Copyright © 2018 Author et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.