A randomized protocol for signing contracts
Communications of the ACM
A course in number theory and cryptography
A course in number theory and cryptography
Efficient verifiable encryption (and fair exchange) of digital signatures
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Fairness in electronic commerce
Fairness in electronic commerce
ACM Transactions on Computer Systems (TOCS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Accountable-subgroup multisignatures: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Convertible Undeniable Signatures
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
RSA-Based Undeniable Signatures
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
ACM SIGecom Exchanges
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Networked Cryptographic Devices Resilient to Capture
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
New convertible undeniable signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Proving in zero-knowledge that a number is the product of two safe primes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Optimistic fair exchange of digital signatures
IEEE Journal on Selected Areas in Communications
Breaking and repairing optimistic fair exchange from PODC 2003
Proceedings of the 3rd ACM workshop on Digital rights management
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
An abuse-free fair contract signing protocol based on the RSA signature
WWW '05 Proceedings of the 14th international conference on World Wide Web
Generic non-repudiation protocols supporting transparent off-line TTP
Journal of Computer Security - On IWAP'05
Smart card-based agents for fair non-repudiation
Computer Networks: The International Journal of Computer and Telecommunications Networking
An optimistic fair exchange protocol and its security in the universal composability framework
International Journal of Applied Cryptography
Fair exchange protocol of signatures based on aggregate signatures
Computer Communications
Certificate-based fair exchange protocol of signatures from pairings
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Fair Mobile Payment Protocol
APNOMS '08 Proceedings of the 11th Asia-Pacific Symposium on Network Operations and Management: Challenges for Next Generation Network Operations and Service Management
Ambiguous Optimistic Fair Exchange
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A new fair non-repudiation protocol for secure negotiation and contract signing
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Efficient Fair Exchange from Identity-Based Signature
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
A new dependable exchange protocol
Computer Communications
Analysis and improvement of fair certified e-mail delivery protocol
Computer Standards & Interfaces
An efficient ID-based verifiably encrypted signature scheme based on Hess's scheme
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Optimistic fair exchange in a multi-user setting
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
An abuse-free fair contract-signing protocol based on the RSA signature
IEEE Transactions on Information Forensics and Security
A practical electronic payment scheme
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Timeliness optimistic fair exchange protocol based on key-exposure-free chameleon hashing scheme
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator
Computers and Electrical Engineering
Double verifiably encrypted signature-based contract signing protocol
ICICA'10 Proceedings of the First international conference on Information computing and applications
A new construction of designated confirmer signature and its application to optimistic fair exchange
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
One-time trapdoor one-way functions
ISC'10 Proceedings of the 13th international conference on Information security
Group-oriented fair exchange of signatures
Information Sciences: an International Journal
Fair and abuse-free contract signing protocol from Boneh-Boyen signature
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Multi-party concurrent signatures
ISC'06 Proceedings of the 9th international conference on Information Security
Cryptanalysis of two signature schemes based on bilinear pairings in CISC '05
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Stand-Alone and setup-free verifiably committed signatures
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Dependable transaction for electronic commerce
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
Efficient ID-Based optimistic fair exchange with provable security
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Further observations on optimistic fair exchange protocols in the multi-user setting
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
More on stand-alone and setup-free verifiably committed signatures
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
An efficient certified email protocol
ISC'07 Proceedings of the 10th international conference on Information Security
Information Sciences: an International Journal
Hi-index | 0.00 |
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allows two parties to exchange items in a fair way so that either each party gets the other's item, or neither party does. We describe a novel method of constructing very efficient fair-exchange protocols by distributing the computation of RSA signatures. Specifically, we employ multisignatures based on the RSA-signature scheme. To date, the vast majority of fair-exchange protocols require the use of zero-knowledge proofs, which is the most computationally intensive part of the exchange protocol. Using the intrinsic features of our multisignature model, we construct protocols that require no zero-knowledge proofs in the exchange protocol. Use of zero-knowledge proofs is needed only in the protocol setup phase--this is a one-time cost. Furthermore, our scheme uses multisignatures that are compatible with the underlying standard (single-signer) signature scheme, which makes it possible to readily integrate the fair-exchange feature with existing e-commerce systems.