Proceedings of CRYPTO 84 on Advances in cryptology
Non-repudiation with mandatory proof of receipt
ACM SIGCOMM Computer Communication Review
Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
Optimal efficiency of optimistic contract signing
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Fairness in electronic commerce
Fairness in electronic commerce
Investigation of non-repudiation protocols
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Efficient Fair Exchange with Verifiable Confirmation of Signatures
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Off-Line Fair Payment Protocols Using Convertible Signatures
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
An Efficient Non-repudiation Protocol
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party
ISC '01 Proceedings of the 4th International Conference on Information Security
Exclusion-Freeness in Multi-party Exchange Protocols
ISC '02 Proceedings of the 5th International Conference on Information Security
Cryptanalysis of the Wu--Varadhrajan fair exchange protocol
Information Processing Letters
Fair certified e-mail delivery
Proceedings of the 2004 ACM symposium on Applied computing
Certified E-Mail Delivery with DSA Receipts
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Compositional analysis of contract-signing protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
Generic non-repudiation protocols supporting transparent off-line TTP
Journal of Computer Security - On IWAP'05
A secure protocol for misbehavior-penalization-based fair digital signature exchange
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Exclusions and related trust relationships in multi-party fair exchange protocols
Electronic Commerce Research and Applications
Multiparty nonrepudiation: A survey
ACM Computing Surveys (CSUR)
Signet: low-cost auditable transactions using SIMs and mobile phones
ACM SIGOPS Operating Systems Review
On fairness in exchange protocols
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Fair exchange of valuable information: A generalised framework
Journal of Computer and System Sciences
Fair and abuse-free contract signing protocol from Boneh-Boyen signature
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
A fair and reliable p2p e-commerce model based on collaboration with distributed peers
IWDC'05 Proceedings of the 7th international conference on Distributed Computing
Usable optimistic fair exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
Attacking an asynchronous multi-party contract signing protocol
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Usable optimistic fair exchange
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
An efficient certified email protocol
ISC'07 Proceedings of the 10th international conference on Information Security
A Practical Approach of Fairness in E-Procurement
International Journal of Information Security and Privacy
Hi-index | 0.00 |
We propose a new protocol allowing the exchange of an item against a signature while assuring fairness. The proposed protocol, based on the Girault-Poupard-Stern signature scheme (a variation of the Schnorr scheme), assumes the existence of a trusted third party that, except in the setup phase, is involved in the protocol only when one of the parties does not follow the designated protocol or some technical problem occurs during the execution of the protocol. The interesting feature of the protocol is the low communication and computational charges required by the parties. Moreover, in case of problems during the main protocol, the trusted third party can derive the same digital signature as the one transmitted in a faultless case, rather than an affidavit or an official certificate.