Advertisement

An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution

  • Indrakshi Ray
  • Indrajit Ray
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1875)

Abstract

In this paper we propose an e-commerce protocol with the following features: (1) ensures true fair exchange, (2) does not require manual dispute resolution in case of unfair behavior by any party, (3) does not require the active involvement of a trusted third party, (4) allows the customer to verify that the product he is about to receive is the one he is paying for, and (5) can be used for the fair exchange of any two digital items.

Keywords

Dispute Resolution Multiplicative Inverse Fair Exchange Electronic Payment Digital Item 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    N. Asokan, M. Schunter, and M. Waidner. Optimistic Protocols for Fair Exchange. In T. Matsumoto, editor, Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 7–17, Zurich, Switzerland, April 1997.Google Scholar
  2. 2.
    N. Asokan, V. Shoup, and M. Waidner. Asynchronous Protocols for Optimistic Fair Exchange. In Proceedings of the IEEE Symposium on Security and Privacy, pages 86–99, Oakland, California, May 1998.Google Scholar
  3. 3.
    N. Asokan, V. Shoup, and M. Waidner. Optimistic Fair Exchange of Digital Signatures. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Eurocrypt’ 98, pages 591–606, Helsinki, Finland, June 1998.Google Scholar
  4. 4.
    A. Bahreman and J. D. Tygar. Certified Electronic Mail. In Proceedings of the Internet Society Symposium on Network and Distributed Systems Security, pages 3–19, February 1994.Google Scholar
  5. 5.
    F. Bao, R. H. Deng, and W. Mao. Efficient and Practical Fair Exchange Protocols with Off-line TTP. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, May 1998.Google Scholar
  6. 6.
    M. Blum. How to Exchange (Secret) Keys. ACM Transactions on Computer Systems, 1:175–193, 1983.CrossRefGoogle Scholar
  7. 7.
    D. Bolignano. Towards the Formal Verification of Electronic Commerce Protocols. In Proceedings of the 10th IEEE Computer Security Foundations Workshop, June 1997.Google Scholar
  8. 8.
    B. Cox, J. D. Tygar, and M. Sirbu. NetBill Security and Transaction Protocol. In Proceedings of the 1st USENIX Workshop in Electronic Commerce, pages 77–88, July 1995.Google Scholar
  9. 9.
    R. H. Deng, L. Gong, A. A. Lazar, and W. Wang. Practical Protocols for Certified Electronic Mail. Journal of Network and System Management, 4(3), 1996.Google Scholar
  10. 10.
    S. Even, O. Goldreich, and A. Lempel. A Randomized Protocol for Signing Contracts. Communications of the ACM, 28(6):637–647, June 1985.Google Scholar
  11. 11.
    M. K. Franklin and M. K. Reiter. Fair Exchange with a semi-trusted Third Party. In T. Matsumoto, editor, Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 1–6, Zurich, Switzerland, April 1997.Google Scholar
  12. 12.
    N. Heintze, J. Tygar, J. Wing, and H. Wong. Model Checking Electronic Commerce Protocols. In Proceedings of the 2nd USENIX Workshop in Electronic Commerce, pages 146–164, November 1996.Google Scholar
  13. 13.
    B. Kaliski and M. Robshaw. The Secure Use of RSA. CryptoBytes, 1(3):7–13, 1995.Google Scholar
  14. 14.
    S. Ketchpel. Transaction Protection for Information Buyers and Sellers. In Proceedings of the Dartmouth Institute for Advanced Graduate Studies’ 95: Electronic Publishing and the Information Superhighway, 1995.Google Scholar
  15. 15.
    S. Ketchpel and H. Garcia-Molina. Making Trust Explicit in Distributed Commerce Transactions. In Proceedings of the 16th International Conference on Distributed Computing Systems, pages 270–281, 1996.Google Scholar
  16. 16.
    I. Niven and H. S. Zuckerman. An Introduction to the Theory of Numbers. John Wiley and Sons, 4th edition, 1980.Google Scholar
  17. 17.
    D. O’Mahoney, M. Peirce, and H. Tewari. Electronic Payment Systems. Artech House, 1997.Google Scholar
  18. 18.
    I. Ray, I. Ray, and N. Narasimhamurthi. A Fair-Exchange Protocol with Automated Dispute Resolution. In Proceedings of the 14th Annual IFIP WG 11.3 Working Conference on Database Security, Schoorl, The Netherlands, August 2000.Google Scholar
  19. 19.
    J. Zhou and D. Gollmann. A Fair Non-repudiation Protocol. In Proceedings of the IEEE Symposium on Security and Privacy, pages 55–61, Oakland, California, May 1996.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Indrakshi Ray
    • 1
  • Indrajit Ray
    • 1
  1. 1.Department of Computer and Information ScienceUniversity of MichiganDearbornUSA

Personalised recommendations