A randomized protocol for signing contracts
Communications of the ACM
Practical and provably secure release of a secret and exchange of signatures
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
How to simultaneously exchange secrets by general assumptions
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Gradual and Verifiable Release of a Secret
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Controlled Gradual Disclosure Schemes for Random Bits and Their Applications
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
On Unifying Some Cryptographic Protocol Logics
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Exploring Fair Exchange Protocols Using Specification Animation
ISW '00 Proceedings of the Third International Workshop on Information Security
Providing Certified Mail Services on the Internet
IEEE Security and Privacy
Adaptation of agent-based non-repudiation protocol to mobile digital right management (DRM)
Expert Systems with Applications: An International Journal
On the (im)possibility of perennial message recognition protocols without public-key cryptography
Proceedings of the 2011 ACM Symposium on Applied Computing
A fair online payment system for digital content via subliminal channel
Electronic Commerce Research and Applications
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach
Transactions on Data Privacy
Digital identity security architecture in Ethos
Proceedings of the 7th ACM workshop on Digital identity management
Is the verification problem for cryptographic protocols solved?
Proceedings of the 11th international conference on Security Protocols
Design and implementation of an inline certified e-mail service
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
SeVe: automatic tool for verification of security protocols
Frontiers of Computer Science in China
Building reliable mix networks with fair exchange
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Deciding properties of contract-signing protocols
STACS'05 Proceedings of the 22nd annual conference on Theoretical Aspects of Computer Science
On the quest for impartiality: design and analysis of a fair non-repudiation protocol
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Further observations on optimistic fair exchange protocols in the multi-user setting
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
A formal analysis of fairness and non-repudiation in the RSA-CEGD protocol
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
On the formal analyses of the zhou-gollmann non-repudiation protocol
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Secure untrusted binaries — provably!
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Towards verification of timed non-repudiation protocols
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Securing digital signatures for non-repudiation
Computer Communications
A private online system for executing wills based on a secret sharing mechanism
Security and Communication Networks
Model checking under fairness in proB and its application to fair exchange protocols
ICTAC'12 Proceedings of the 9th international conference on Theoretical Aspects of Computing
A Practical Approach of Fairness in E-Procurement
International Journal of Information Security and Privacy
Formal performance modelling: from protocols to people
EPEW'12 Proceedings of the 9th European conference on Computer Performance Engineering
Formal performance modelling: from protocols to people
EPEW'12 Proceedings of the 9th European conference on Computer Performance Engineering
Hi-index | 0.00 |
A fair non-repudiation protocol should not give the sender of a message an advantage over the receiver, or vice versa. We will present a fair non-repudiation protocol that requires a Trusted Third Party but attempts to minimize its involvement in the execution of the protocol. We will draw particular attention to the nonstandard use of encryption in our protocol and discuss some aspects of its formal verification.