A randomized protocol for signing contracts
Communications of the ACM
Security in computing
Fair exchange with a semi-trusted third party (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
ACM SIGecom Exchanges
Simple and fast optimistic protocols for fair electronic exchange
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Failure Analysis of an E-Commerce Protocol Using Model Checking
WECWIS '00 Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000)
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Hi-index | 0.00 |
In this paper, we address the problem of fair exchange of multimedia files and propose a fair multimedia exchange protocol. The protocol is fair in such a way that none of the parties obtain a significant advantage and cheat on the other party by terminating the protocol abruptly. In the application scenario that we considered two parties want to exchange some multimedia files such that neither party wants to transmit its own data in its entirety before receiving other party’s data. The proposed fair multimedia exchange protocol uses a baby-step approach in which data are sent in parts and the probability of protocol completion is gradually increased over several cycles. We also implemented the proposed protocol and comparatively analyzed its performance. We observed that, in terms of execution time, the proposed protocol performs close to a secure but unfair protocol for the same amount of exchange data.