A randomized protocol for signing contracts
Communications of the ACM
Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
CRYPTO '88 Proceedings on Advances in cryptology
Atomicity in electronic commerce
PODC '96 Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing
Fair exchange with a semi-trusted third party (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
ACM Transactions on Computer Systems (TOCS)
Communications of the ACM
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Model checking electronic commerce protocols
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Advantages of a leveled commitment contracting protocol
AAAI'96 Proceedings of the thirteenth national conference on Artificial intelligence - Volume 1
Orchestrating fair exchanges between mutually distrustful web services
Proceedings of the 3rd ACM workshop on Secure web services
Decision Support Systems
Trust in consumer-to-consumer electronic commerce
Information and Management
An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest
SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
Information and Software Technology
Buyer-seller watermarking protocols with off-line trusted third parties
International Journal of Ad Hoc and Ubiquitous Computing
Anonymous Fair Transaction Protocols Based on Electronic Cash
International Journal of Electronic Commerce
Efficient and secure protocol in fair certified E-mail delivery
WSEAS Transactions on Information Science and Applications
An incentive-based electronic payment scheme for digital content transactions over the Internet
Journal of Network and Computer Applications
A generalised model of e-trading for gradual secret release fair exchange protocol
International Journal of Electronic Security and Digital Forensics
A fair-exchange and customer-anonymity electronic commerce protocol for digital content transactions
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Fair E-payment protocol based on certificateless signature and authenticated key exchange
ICICA'10 Proceedings of the First international conference on Information computing and applications
A topological condition for solving fair exchange in byzantine environments
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Risk balance in optimistic non-repudiation protocols
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
An efficient certified email protocol
ISC'07 Proceedings of the 10th international conference on Information Security
A Practical Approach of Fairness in E-Procurement
International Journal of Information Security and Privacy
Hi-index | 0.00 |
In an electronic commerce environment, the merchant and the customer are unlikely to trust each other. This problem has motivated researchers to propose fair-exchange protocols based on using an on-line trusted third party; the third party receives the items being exchanged from the customer and the merchant and then forwards it to the other party in a fair manner. However, the third party is a source of bottleneck for these protocols. Not only is the performance of the third party an issue, but also its vulnerability to denial of service attacks. In this paper, we propose an optimistic protocol in which the trusted third party is invoked only if any party misbehaves or prematurely aborts. The protocol achieves fairness and dispute resolution is performed automatically within the scope of the protocol. We show how we can distribute the function of the trusted third party across several third parties; this increases the robustness of the protocol. Additionally, we show how by adopting a payment mechanism based on electronic cash, we provide anonymity to the customer's transactions.