A randomized protocol for signing contracts
Communications of the ACM
Fair exchange with a semi-trusted third party (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
Efficient verifiable encryption (and fair exchange) of digital signatures
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
ACM Transactions on Computer Systems (TOCS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Certified email with a light on-line trusted third party: design and implementation
Proceedings of the 11th international conference on World Wide Web
Alternating-time temporal logic
Journal of the ACM (JACM)
An efficient protocol for anonymous and fair document exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Observations on Non-repudiation
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Optimistic Fair Exchange with Transparent Signature Recovery
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Some Remarks on a Fair Exchange Protocol
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
An Efficient Non-repudiation Protocol
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Fair certified e-mail delivery
Proceedings of the 2004 ACM symposium on Applied computing
A Security Protocol for Certified E-Goods Delivery
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Optimistic fair exchange of digital signatures
IEEE Journal on Selected Areas in Communications
Generic non-repudiation protocols supporting transparent off-line TTP
Journal of Computer Security - On IWAP'05
Hi-index | 0.00 |
This paper presents two variant protocols RSA-CEMDI and RDA-CEMD2 for certified e-mail delivery with RSA receipts. The protocols provide non-repudiation of origin and non-repudiation of receipt security services to protect communicating parties from each other's false denials that the e-mail message has been sent and received. The protocols also provide strong fairness to ensure that the recipient receives the e-mail if and only if the sender receives the receipt. Services of an off-time and transparent third party are invoked in the protocols only in exceptional circumstances, i.e.. when the communicating parties fail to complete the e-mail for receipt exchange due to a network failure or a party's misbehaviour. Protocol RSA-CEMDI also offers confidentiality protection for the e-mail message and the corresponding receipt from the third party, achieved at the cost of some additional computations. The protocols are based on a cryptographic primitive called Verifiable and Recoverable Encryption of a Signature (VRES). The novel design of the VRES allows efficiency improvements in comparison with the related certified e-mail delivery protocols based on similar primitives.