scispace - formally typeset
Journal ArticleDOI

Generic non-repudiation protocols supporting transparent off-line TTP

TLDR
It is argued that it is really meaningful in practice to exploit generic fair non-repudiation protocols with transparent off-line trusted third party (TTP) to overcome some limitations and shortcomings in previous schemes.
Abstract
A non-repudiation protocol enables the fair exchange of an electronic message and an irrefutable digital receipt between two mistrusting parties over the Internet. That is, at the end of any execution instance of such a protocol, either both parties obtain their expected items or neither party does. In this paper, we first argue that it is really meaningful in practice to exploit generic fair non-repudiation protocols with transparent off-line trusted third party (TTP). Namely, in those protocols, each involved party could use any secure digital signature algorithm to produce non-repudiation evidences; and the issued evidences are the same regardless of whether the TTP is involved or not. Then, we present such a fair non-repudiation protocol to overcome some limitations and shortcomings in previous schemes. Technical discussions are provided to show that our protocol is not only secure but also the most efficient solution, compared with existing non-repudiation protocols. In addition, some potential extensions are also pointed out.

read more

Citations
More filters
Proceedings ArticleDOI

Receipt management- transaction history based trust establishment

TL;DR: This paper presents the VeryIDX system that implements an electronic receipt infrastructure and supports protocols to build and manage online transaction history of users and presents a basic yet reasonably expressive language which provides service providers with a new way to establish trust based on users' transaction history.
Journal ArticleDOI

An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature

TL;DR: This paper presents the first abuse-free fair contract-signing protocol based on the RSA signature, and shows that it is both secure and efficient.
Journal ArticleDOI

State and Progress in Strand Spaces: Proving Fair Exchange

TL;DR: The strand space framework is adapted to protocols, such as fair exchange, that coordinate state changes, and protocol actions are allowed to cause local changes in this state via multiset rewriting.
Proceedings ArticleDOI

An abuse-free fair contract signing protocol based on the RSA signature

TL;DR: This paper presents the first abuse-free fair contract-signing protocol based on the RSA signature, and shows that it is both secure and efficient.
Journal ArticleDOI

An optimistic fair exchange protocol based on signature policies

TL;DR: A new fair exchange protocol based on signature policies is presented, which allows the buyer to decide if trust or not in the rules that will manage the transaction, increasing the user's confidence in e-commerce.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Book ChapterDOI

How to prove yourself: practical solutions to identification and signature problems

TL;DR: Simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys are described.
Journal ArticleDOI

A digital signature scheme secure against adaptive chosen-message attacks

TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.
Book ChapterDOI

A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack

TL;DR: In this paper, a new public key cryptosystem is proposed and analyzed, which is provably secure against adaptive chosen ciphertext attack under standard intractability assumptions. But the scheme is quite practical, and is not provable to be used in practice.
Journal ArticleDOI

A randomized protocol for signing contracts

TL;DR: The 1-out-of-2 oblivious transfer as discussed by the authors allows one party to transfer exactly one secret, out of two recognizable secrets, to his counterpart, while the sender is ignorant of which secret has been received.