Skip to main content

A Fair Multimedia Exchange Protocol

  • Conference paper
Computer and Information Sciences - ISCIS 2005 (ISCIS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3733))

Included in the following conference series:

  • 2625 Accesses

Abstract

In this paper, we address the problem of fair exchange of multimedia files and propose a fair multimedia exchange protocol. The protocol is fair in such a way that none of the parties obtain a significant advantage and cheat on the other party by terminating the protocol abruptly. In the application scenario that we considered two parties want to exchange some multimedia files such that neither party wants to transmit its own data in its entirety before receiving other party’s data. The proposed fair multimedia exchange protocol uses a baby-step approach in which data are sent in parts and the probability of protocol completion is gradually increased over several cycles. We also implemented the proposed protocol and comparatively analyzed its performance. We observed that, in terms of execution time, the proposed protocol performs close to a secure but unfair protocol for the same amount of exchange data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ray, I., Ray, I.: Fair Exchange in E-commerce. ACM SIGEcomm Exchange 3(2), 9–17 (2002)

    Article  Google Scholar 

  2. Ray, I., Ray, I.: An Optimistic Fair-exchange E-commerce Protocol with Automated Dispute Resolution. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol. 1875, p. 84. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  3. Ray, I., Ray, I.: An Anonymous Fair-exchange E-commerce Protocol. In: Proceedings of the 1st International Workshop on Internet Computing and E-Commerce (2001)

    Google Scholar 

  4. Ray, I., Ray, I.: A Fair-Exchange Protocol with Automated Dispute Resolution. In: Proceedings of the 14th Annual IFIP WG 11.3 Working Conference on Database Security. Schoorl, The Netherlands (2000)

    Google Scholar 

  5. Ray, I., Ray, I.: Failure Analysis of an E-commerce Protocol Using Model Checking. In: Proceedings of the Second International Workshop on Advanced Issues of E-Commerce and Web-based Information Systems, Milpitas, CA (2000)

    Google Scholar 

  6. Cox, B., Tygar, J.D., Sirbu, M.: NetBill Security and Transaction Protocol. In: Proceedings of the 1st USENIX Workshop in Electronic Commerce, pp. 77–88 (1995)

    Google Scholar 

  7. Ketchpel, S.: Transaction Protection for Information Buyers and Sellers. In: Proceedings of the Dartmouth Institute for Advanced Graduate Studies 1995: Electronic Publishing and the Information Superhighway (1995)

    Google Scholar 

  8. Micali, S.: Simple and Fast Optimistic Protocols for Fair Electronic Exchange. In: Annual ACM Symposium on Principles of Distributed Computing, pp. 12–19 (2003)

    Google Scholar 

  9. Even, S., Goldreich, O., Lempel, A.: A Randomizing Protocol for Signing Contracts. Communications of the ACM 28(6), 637–647 (1985)

    Article  MathSciNet  Google Scholar 

  10. Asokan, N., Shoup, V., Waidner, M.: Asynchronous Protocols for Optimistic Fair Exchange. In: proceedings of the IEEE Symp. on Res. in Security and Privacy (1998)

    Google Scholar 

  11. Ben-Or, M., Goldreich, O., Micali, S., Rivest, R.L.: A Fair Protocol for Signing Contracts. IEEE Transactions on Information Theory 36(1), 40–46 (1990)

    Article  Google Scholar 

  12. Pfleeger, C.P.: Security in Computing. Prentice-Hall, Englewood Cliffs (1989)

    Google Scholar 

  13. Schneier, B.: Applied Cryptography (1996)

    Google Scholar 

  14. Franklin, M.K., Reiter, M.K.: Fair Exchange with a Semi-Trusted Third Party. In: 4th ACM Conference on Computer and Communications Security, pp. 1–5 (1997)

    Google Scholar 

  15. Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Comm. of the ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  16. NIST, Digital Signature Standard (DSS), FIPS PUB 186-2 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Oniz, C.C., Savas, E., Levi, A. (2005). A Fair Multimedia Exchange Protocol. In: Yolum, p., Güngör, T., Gürgen, F., Özturan, C. (eds) Computer and Information Sciences - ISCIS 2005. ISCIS 2005. Lecture Notes in Computer Science, vol 3733. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11569596_37

Download citation

  • DOI: https://doi.org/10.1007/11569596_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29414-6

  • Online ISBN: 978-3-540-32085-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics