Abstract
We envision a scenario where contract signers put their portable document format (PDF) contract into a blockchain application that outputs a signed contract, while blockchain nodes don’t know the contract content, contract signers’ identities and contract signatures. Comparing to current centralized online contract signing services, blockchain applications could avoid single point of failure, internal attacks and data loss. More importantly, the application also provides fairness and privacy properties. By fairness, we mean that contract signers obtain a signed contract simultaneously, or obtain nothing, or some signer obtains a singed contract at the cost of paying contract coins. By privacy, we mean that contract contents, signatures, and signers’ identities are hidden from blockchain nodes. At last, we support RSA signatures whose verification is embedded in most PDF readers, which makes the whole solution practical.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adam, B.: Hashcash - amortizable publicly auditable cost-functions. http://www.hashcash.org/papers/amortizable.pdf. Accessed 4 Aug 2017
Adobe: Digital signatures in a PDF. http://120.198.244.57:9999/www.adobe.com/devnet-docs/acrobatetk/tools/DigSig/Acrobat_DigitalSignatures_in_PDF.pdf. Accessed 4 Aug 2017
Al-Saggaf, A.A., Ghouti, L.: Efficient abuse-free fair contract-signing protocol based on an ordinary crisp commitment scheme. IET Inf. Secur. 9(1), 50–58 (2015)
Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, Ł.: Fair Two-party computations via bitcoin deposits. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 105–121. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44774-1_8
Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, L.: Secure multiparty computations on bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 443–458, May 2014
Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. IEEE J. Sel. Areas Commun. 18(4), 593–610 (2000)
Ateniese, G.: Verifiable encryption of digital signatures and applications. ACM Trans. Inf. Syst. Secur. 7(1), 1–20 (2004)
Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better — how to make bitcoin a better currency. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399–414. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32946-3_29
Bellare, M., Rogaway, P.: The exact security of digital signatures-how to sign with RSA and Rabin. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399–416. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68339-9_34
Ben-Or, M., Goldreich, O., Micali, S., Rivest, R.L.: A fair protocol for signing contracts. IEEE Trans. Inf. Theor. 36(1), 40–46 (1990)
Biham, E., Boneh, D., Reingold, O.: Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring. Inf. Process. Lett. 70(2), 83–87 (1999)
Blum, M.: How to exchange (secret) keys. In: Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing, pp. 440–447. ACM (1983)
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-39200-9_26
Deng, R.H., Gong, L., Lazar, A.A., Wang, W.: Practical protocols for certified electronic mail. J. Netw. Syst. Manag. 4(3), 279–297 (1996)
Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-48071-4_10
Even, S.: A protocol for signing contracts. SIGACT News 15(1), 34–39 (1983)
Franklin, M.K., Reiter, M.K.: Fair exchange with a semi-trusted third party (extended abstract). In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 1–5. ACM (1997)
Garay, J.A., Jakobsson, M., MacKenzie, P.: Abuse-free optimistic contract signing. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 449–466. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_29
Germanus, D., Ismail, H., Suri, N.: PASS: an address space slicing framework for P2P eclipse attack mitigation. In: 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), pp. 74–83, September 2015
Gervais, A., Ritzdorf, H., Karame, G.O., Capkun, S.: Tampering with the delivery of blocks and transactions in bitcoin. In: Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security (CCS 2015), pp. 692–705. ACM (2015)
Goldreich, O.: A simple protocol for signing contracts. In: Chaum, D. (ed.) Advances in Cryptology, pp. 133–136. Springer, Boston (1984). https://doi.org/10.1007/978-1-4684-4730-9_11
Haibo, T., Jiejie, H., Liqing, F.: A privacy preserving fair contract signing protocol based on block chains. J. Cryptol. Res. 4(2), 187–198 (2017)
Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: Proceedings of the 24th USENIX Conference on Security Symposium (SEC 2015), pp. 129–144. USENIX Association, Berkeley (2015)
Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 106–120. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-79263-5_7
Ismail, H., Germanus, D., Suri, N.: Detecting and mitigating P2P eclipse attacks. In: 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS), pp. 224–231, December 2015
Jian, L., Wenting, L., Karame, G.O., Asokan, N.: Towards fairness of cryptocurrency payments (2016)
Juels, A., Kosba, A., Shi, E.: The Ring of Gyges: investigating the future of criminal smart contracts. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 283–295. ACM, New York (2016)
Kiayias, A., Zhou, H.-S., Zikas, V.: Fair and Robust multi-party computation using a global transaction ledger. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 705–734. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49896-5_25
Loibl, A.: Namecoin (2014)
Luu, L., Chu, D.-H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 254–269. ACM, New York (2016)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
Okamoto, T., Ohta, K.: How to simultaneously exchange secrets by general assumptions. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 184–192. ACM (1994)
McCorry, S.S.P., Hao, F.: A smart contract for boardroom voting with maximum voter privacy. In: Financial Cryptography and Data Security 2017, pp. 1–18 (2017)
Peter, T.: Op_checklocktimeverify. https://github.com/bitcoin/bips/blob/master/bip-0065.mediawiki. Accessed 4 Apr 2017
Sprankel, S.: Technical basis of digital currencies (2013)
Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS 1996, pp. 31–37. ACM, New York (1996)
Stini, M., Mauve, M.: Enabling fair offline trading. In: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, pp. 973–978. ACM (2009)
Vishnumurthy, V., Chandrakumar, S., Ch, S., Sirer, E.G.: KARMA: A secure economic framework for peer-to-peer resource sharing (2003)
Wan, Z., Deng, R.H., Lee, D.: Electronic contract signing without using trusted third party. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds.) Network and System Security. LNCS, vol. 9408, pp. 386–394. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-25645-0_27
Wang, G.: An abuse-free fair contract-signing protocol based on the RSA signature. IEEE Trans. Inf. Forensics Secur. 5(1), 158–168 (2010)
Wood, D.G.: Ethereum: a secure decentralised g generalised transaction ledger homestead (2014)
Zhang, F., Safavi-Naini, R., Susilo, W.: Efficient verifiably encrypted signature and partially blind signature from bilinear pairings. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 191–204. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-24582-7_14
Zhang, F., Safavi-Naini, R., Susilo, W.: An efficient signature scheme from bilinear pairings and its applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277–290. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24632-9_20
Zhao, Z., Chan, T.-H.H.: How to vote privately using bitcoin. In: Qing, S., Okamoto, E., Kim, K., Liu, D. (eds.) ICICS 2015. LNCS, vol. 9543, pp. 82–96. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29814-6_8
Acknowledgment
This work is supported by the National Key R&D Program of China (2017YFB0802503), Natural Science Foundation of China (61672550), Natural Science Foundation of Guangdong Province, China (2015A030313133), and Fundamental Research Funds for the Central Universities (No. 17lgjc45). We are grateful to the fruitful discussion with Prof. Qianhong Wu about contract signers’ anonymity.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Tian, H., He, J., Fu, L. (2017). Contract Coin: Toward Practical Contract Signing on Blockchain. In: Liu, J., Samarati, P. (eds) Information Security Practice and Experience. ISPEC 2017. Lecture Notes in Computer Science(), vol 10701. Springer, Cham. https://doi.org/10.1007/978-3-319-72359-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-72359-4_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72358-7
Online ISBN: 978-3-319-72359-4
eBook Packages: Computer ScienceComputer Science (R0)