A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Proxy signature schemes based on factoring
Information Processing Letters
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Verifiable encryption of digital signatures and applications
ACM Transactions on Information and System Security (TISSEC)
A Family of Trusted Third Party Based Fair-Exchange Protocols
IEEE Transactions on Dependable and Secure Computing
Efficient and secure protocol in fair document exchange
Computer Standards & Interfaces
Fair exchange protocol of signatures based on aggregate signatures
Computer Communications
Efficient Fair Exchange from Identity-Based Signature
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Autonomous mobile agent based fair exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
Practical threshold signatures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
A novel verifiably encrypted signature scheme without random oracle
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Optimistic fair exchange of digital signatures
IEEE Journal on Selected Areas in Communications
Efficient autonomous signature exchange on ubiquitous networks
Journal of Network and Computer Applications
Hi-index | 0.00 |
This paper addresses the issue of fair (signature or key) exchange in emerging ubiquitous commerce (u-commerce). Such an application poses new security challenges. In particular, it involves distributed and autonomous operations running in a much open, dynamic and resource-diversified networking environment, which makes an exchange highly susceptible to security attacks and system failures. Existing approaches to fair exchange are ineffective in dealing with the new challenges as their design did not envisage such complex operational situations. In this paper, we aim to propose a novel fair exchange protocol specifically for u-commerce in response to the new challenges. The protocol is supported by an integration of several techniques, such as threshold proxy signatures, purpose-restricted encryption key certification and threshold verifiable proxy encryption, to accomplish the fairness of exchange in u-commerce settings. The protocol analysis is also provided for the proof of its fairness.