A randomized protocol for signing contracts
Communications of the ACM
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Efficient verifiable encryption (and fair exchange) of digital signatures
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Simple and fast optimistic protocols for fair electronic exchange
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Breaking and repairing optimistic fair exchange from PODC 2003
Proceedings of the 3rd ACM workshop on Digital rights management
ACM SIGOPS Operating Systems Review
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Sequential aggregate signatures and multisignatures without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
An intensive survey of fair non-repudiation protocols
Computer Communications
Certificate-based verifiably encrypted signatures from pairings
Information Sciences: an International Journal
Certificate-based fair exchange protocol of signatures from pairings
Computer Networks: The International Journal of Computer and Telecommunications Networking
A new certificateless aggregate signature scheme
Computer Communications
Timeliness optimistic fair exchange protocol based on key-exposure-free chameleon hashing scheme
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator
Computers and Electrical Engineering
Double verifiably encrypted signature-based contract signing protocol
ICICA'10 Proceedings of the First international conference on Information computing and applications
Achieving autonomous fair exchange in ubiquitous network settings
Journal of Network and Computer Applications
Efficient autonomous signature exchange on ubiquitous networks
Journal of Network and Computer Applications
Hi-index | 0.24 |
In Eurocrypt 2003, Boneh et al. proposed verifiably encrypted signatures from the concept of aggregate signatures that support aggregation. Such signatures enable verifiers to test that a given ciphertext is the encryption of a signature on a given message. Verifiably encrypted signatures are used in fair exchange protocols of signatures. In this paper, we first show that Boneh et al.'s verifiably encrypted signature is not secure against rogue-key attacks. Moreover, the fairness of fair exchange protocols of signatures with the adjudicator relies on the neutrality of the adjudicator, which has become a major practical hindrance to fair exchange protocols of signatures getting widely deployed. Then we propose a fair exchange protocol of signatures from pairings by using aggregate signatures. We not only enhance the fair exchange protocol of signatures against three types of inside attackers but also relax the need of the trust in the adjudicator so that it only needs to be trusted by the signer.