Replay attack in a fair exchange protocol

  • Authors:
  • Macià Mut-Puigserver;Magdalena Payeras-Capellà;Josep Lluís Ferrer-Gomila;Llorenç Huguet-Rotger

  • Affiliations:
  • Universitat de les Illes Balears, Carretera de Valldemossa, Palma de Mallorca, Spain;Universitat de les Illes Balears, Carretera de Valldemossa, Palma de Mallorca, Spain;Universitat de les Illes Balears, Carretera de Valldemossa, Palma de Mallorca, Spain;Universitat de les Illes Balears, Carretera de Valldemossa, Palma de Mallorca, Spain

  • Venue:
  • ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

A fair multi-party exchange protocol provides equal treatment to all users, in such a way that at the end of the execution of the exchange, all parties have the element that wished to obtain, or none of them has obtained any valid item. In this paper, we analyse a well-known multi-party fair exchange protocol and, in spite of the formal proof of its correctness given in [11], we demonstrate that the protocol has a flaw. The weakness provoked by this flaw made possible a replay attack that breaks the fairness of the exchange. We will see as a group of colluding participants in the exchange can get the item from an honest participant and this participant will get nothing. In addition to that, we propose a new protocol to solve the problem of the potential replay attack which preserves the property of semi-trusted neutral party. The property was introduced in the original protocol so as to improve the user confidence in the trusted third party (TTP). Our solution not only preserves this property but also introduces the property of verifiable TTP. The property guaranties evidences from each TTP operation to the users. The evidences can be used to get compensation and correct any wrong situation caused by an incorrect operation of the TTP; for instance, in case of a passive conspiracy of the TTP.