Fair exchange with a semi-trusted third party (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
Efficient verifiable encryption (and fair exchange) of digital signatures
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Real-Time UML: Developing Efficient Objects for Embedded Systems
Real-Time UML: Developing Efficient Objects for Embedded Systems
An Anomymous Fair Exchange E-commerce Protocol
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Supporting fair exchange in mobile environments
Mobile Networks and Applications - Security in mobile computing environments
Optimistic fair exchange of digital signatures
IEEE Journal on Selected Areas in Communications
Efficient and secure protocol in fair document exchange
Computer Standards & Interfaces
An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest
SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
Efficient and secure protocol in fair certified E-mail delivery
WSEAS Transactions on Information Science and Applications
Hi-index | 0.00 |
This paper presents a practical and efficient protocol to support a common Internet-based e-commerce activity--fair document exchange between two parties. This protocol incorporates a novel RSA-based method for the off-line recovery of a document decryption key of a party. The principal idea for such key recovery is based on a verifiable and recoverable encryption of the document decryption key. The verifiability of the encryption allows another party to verify the correctness of the encrypted key without actually knowing the original key, and the recoverability permits a designated third party to decrypt the encrypted key to recover the original key upon a legitimate request. Such verifiable and recoverable key encryption is essential for ensuring the fairness of the exchange. The protocol presented in this paper is more practical, cost-effective and efficient than other relevant protocols designed for fair document exchange.