A course in number theory and cryptography
A course in number theory and cryptography
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Efficient verifiable encryption (and fair exchange) of digital signatures
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Accountable-subgroup multisignatures: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Hierarchical ID-Based Cryptography
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Efficient Construction of (Distributed) Verifiable Random Functions
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Optimistic fair exchange of digital signatures
IEEE Journal on Selected Areas in Communications
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
An abuse-free fair contract signing protocol based on the RSA signature
WWW '05 Proceedings of the 14th international conference on World Wide Web
Proxy re-signatures: new definitions, algorithms, and applications
Proceedings of the 12th ACM conference on Computer and communications security
Generic non-repudiation protocols supporting transparent off-line TTP
Journal of Computer Security - On IWAP'05
Forward-secure signatures in untrusted update environments: efficient and generic constructions
Proceedings of the 14th ACM conference on Computer and communications security
Certificate-based verifiably encrypted signatures from pairings
Information Sciences: an International Journal
An optimistic fair exchange protocol and its security in the universal composability framework
International Journal of Applied Cryptography
Fair exchange protocol of signatures based on aggregate signatures
Computer Communications
Certificate-based fair exchange protocol of signatures from pairings
Computer Networks: The International Journal of Computer and Telecommunications Networking
Ambiguous Optimistic Fair Exchange
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Security Analysis of Zhu-Bao's Verifiably Committed Signature
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Efficient Fair Exchange from Identity-Based Signature
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Fair Threshold Decryption with Semi-Trusted Third Parties
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
A new dependable exchange protocol
Computer Communications
Analysis and improvement of fair certified e-mail delivery protocol
Computer Standards & Interfaces
An efficient ID-based verifiably encrypted signature scheme based on Hess's scheme
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Optimistic fair exchange in a multi-user setting
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Multi-party stand-alone and setup-free verifiably committed signatures
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
An abuse-free fair contract-signing protocol based on the RSA signature
IEEE Transactions on Information Forensics and Security
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Timeliness optimistic fair exchange protocol based on key-exposure-free chameleon hashing scheme
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator
Computers and Electrical Engineering
Key Evolution Systems in Untrusted Update Environments
ACM Transactions on Information and System Security (TISSEC)
Fair threshold decryption with semi-trusted third parties
International Journal of Applied Cryptography
An agent-mediated fair exchange protocol
ICICS'10 Proceedings of the 12th international conference on Information and communications security
A new construction of designated confirmer signature and its application to optimistic fair exchange
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
One-time trapdoor one-way functions
ISC'10 Proceedings of the 13th international conference on Information security
Group-oriented fair exchange of signatures
Information Sciences: an International Journal
Fair and abuse-free contract signing protocol from Boneh-Boyen signature
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Multi-party concurrent signatures
ISC'06 Proceedings of the 9th international conference on Information Security
An ID-based optimistic fair signature exchange protocol from pairings
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
An ID-Based verifiable encrypted signature scheme based on hess’s scheme
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Stand-Alone and setup-free verifiably committed signatures
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Dependable transaction for electronic commerce
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
Efficient ID-Based optimistic fair exchange with provable security
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Generic construction of (identity-based) perfect concurrent signatures
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Further observations on optimistic fair exchange protocols in the multi-user setting
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
More on stand-alone and setup-free verifiably committed signatures
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Time capsule signature: efficient and provably secure constructions
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
An efficient certified email protocol
ISC'07 Proceedings of the 10th international conference on Information Security
Perfect ambiguous optimistic fair exchange
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Information Sciences: an International Journal
Hi-index | 0.00 |
In PODC 2003, Park, Chong, Siegel and Ray [22] proposed an optimistic protocol for fair exchange, based on RSA signatures. We show that their protocol is totally breakable already in the registration phase: the honest-but-curious arbitrator can easily determine the signer's secret key.On a positive note, the authors of [22] informally introduced a connection between fair exchange and "sequential two-party multisignature schemes" (which we call two-signatures), but used an insecure two-signature scheme in their actual construction. Nonetheless, we show that this connection can be properly formalized to imply provably secure fair exchange protocols. By utilizing the state-of-the-art non-interactive two-signature of Boldyreva [6], we obtain an efficient and provably secure (in the random oracle model) fair exchange protocol, which is based on GDH signatures [9].Of independent interest, we introduce a unified model for non-interactive fair exchange protocols, which results in a new primitive we call verifiably committed signatures. Verifiably committed signatures generalize (non-interactive) verifiably encrypted signatures [8] and two-signatures, both of which are sufficient for fair exchange.