scispace - formally typeset
Open AccessBook ChapterDOI

Efficient Fair Exchange with Verifiable Confirmation of Signatures

Liqun Chen
- pp 286-299
Reads0
Chats0
TLDR
A new efficient protocol is proposed, which allows a pair of potentially mistrusting parties to exchange digital signatures over the Internet in a fair way, such that after the protocol is running, either each party obtains the other's signature, or neither of them does.
Abstract
We propose a new efficient protocol, which allows a pair of potentially mistrusting parties to exchange digital signatures over the Internet in a fair way, such that after the protocol is running, either each party obtains the other's signature, or neither of them does. The protocol relies on an off-line Trusted Third Party (TTP), which does not take part in the exchange unless any of the parties behaves improperly or other faults occur. Efficiency of the protocol is achieved by using a cryptographic primitive, called confirmable signatures (or designated confirmer signatures in its original proposal [9]). We recommend using a new efficient confirmable signature scheme in the proposed fair exchange protocol. This scheme combines the family of discrete logarithm (DL) based signature algorithms and a zero-knowledge (ZK) proof on the equality of two DLs. The protocol has a practical level of performance: only a moderate number of communication rounds and ordinary signatures are required. The security of the protocol can be established from that of the underlying signature algorithms and that of the ZK proof used.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures

TL;DR: This work describes a novel method of constructing very efficient fair-exchange protocols by distributing the computation of RSA signatures, which uses multisignatures based on the RSA-signature scheme to construct protocols that require no zero-knowledge proofs in the exchange protocol.
Book ChapterDOI

Confirmer signature schemes secure against adaptive adversaries

TL;DR: A new stronger model that covers this kind of attack is defined and provided and a generic solution based on any secure ordinary signature scheme and public key encryption scheme is provided.
Dissertation

Keeping Fairness Alive : Design and formal verification of optimistic fair exchange protocols

TL;DR: The work in this thesis has been carried out at the centre for mathematics and computer science (CWI) under the auspices of the research school IPA (Institute for Programming research and Algorithmics) and the research has been funded by the Dutch organisation for scientific research (NWO).
Book ChapterDOI

An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party

TL;DR: A protocol where the TTP produces the same evidences that Alice and Bob should have produced in a faultless protocol execution (this prevents, after a succesful protocol execution, to determine whether the T TP was involved or not).
Book ChapterDOI

Optimistic Fair Exchange with Transparent Signature Recovery

TL;DR: A new protocol allowing the exchange of an item against a signature while assuring fairness is proposed, which assumes the existence of a trusted third party that is involved in the protocol only when one of the parties does not follow the designated protocol or some technical problem occurs during the execution of the protocol.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Book ChapterDOI

Efficient Identification and Signatures for Smart Cards

TL;DR: An efficient interactive identification scheme and a related signature scheme that are based on discrete logarithms and which are particularly suited for smart cards are presented.
Journal ArticleDOI

A randomized protocol for signing contracts

TL;DR: The 1-out-of-2 oblivious transfer as discussed by the authors allows one party to transfer exactly one secret, out of two recognizable secrets, to his counterpart, while the sender is ignorant of which secret has been received.
Proceedings Article

A Randomized Protocol for Signing Contracts.

TL;DR: Randomized protocols for signing contracts, certified mail, and flipping a coin are presented and an implementation of the 1-out-of-2 oblivious transfer, using any public key cryptosystem, is presented.
Related Papers (5)