Electronic data interchange and structured message usage
Computer Standards & Interfaces
Classifying electronic data interchanges
Computer Standards & Interfaces
Efficient verifiable encryption (and fair exchange) of digital signatures
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Fair certified e-mail delivery
Proceedings of the 2004 ACM symposium on Applied computing
Practical and efficient fair document exchange over networks
Journal of Network and Computer Applications
Design of a fair proxy raffle protocol on the Internet
Computer Standards & Interfaces
Secure transfer of measurement data in open systems
Computer Standards & Interfaces
Analysis and improvement of fair certified e-mail delivery protocol
Computer Standards & Interfaces
Security proofs for signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Efficient and generalized group signatures
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
The fairness of perfect concurrent signatures
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
An intensive survey of fair non-repudiation protocols
Computer Communications
Optimistic fair exchange of digital signatures
IEEE Journal on Selected Areas in Communications
Achieving autonomous fair exchange in ubiquitous network settings
Journal of Network and Computer Applications
Design and formal verification of a CEM protocol with transparent TTP
Frontiers of Computer Science: Selected Publications from Chinese Universities
Hi-index | 0.00 |
This paper presents a new fair document exchange protocol based on bilinear pairing with off-line trusted third party (TTP). In such a fair exchange scenario, each party owns a valuable message. The protocol is executed with the help of verifiable encrypted message, which could be verified and decrypted by different parties, respectively. Once a party verifies that the exchangeable message could be decrypted by TTP, he firstly sends his own message in that TTP has already provided fairness. Furthermore, to pass verification, each message should be wrapped into a commit message and be certified by an authority. We give an efficient and secure construction by using bilinear pairing. Eventually, we analyze the secure issues and compare our protocol's efficiency with others.