An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest
A new e-Commerce fair exchange protocol is presented in this paper. The protocol is for exchanging payment with digital product (such as computer software) between customer (C) and merchant (M). It makes use of Trusted Third Party (TTP) but its use is kept to minimum when disputes arise. In this respect it is an optimistic fair exchange protocol. A new idea, in which if the parties are willing to exchange then they are encouraged to be honest, is originated in this protocol. The protocol has the following features: (1) It comprises four messages to be exchanged between C and M in the exchange phase; (2) It guarantees strong fairness for both C and M so that by the end of executing the protocol both C and M will have each other’s items or no one has got anything; (3) It allows both parties (C and M) to check the correctness of the item of the other party before they send their item; (4) It resolves disputes automatically online by the help of the Trusted Third Party (TTP); and (5) The proposed protocol is efficient in that it has a low number of modular exponentiations (which is the most expensive operations) when compared to other protocols in the literature.
KeywordsDispute Resolution Exchange Phase Trusted Third Party Digital Product Modular Exponentiation
Unable to display preview. Download preview PDF.
- 1.Alaraj, A., Munro, M.: An e-commerce Fair Exchange Protocol for exchanging Digital Products and Payments. In: Proceedings of IEEE ICDIM 2007, Lyon, pp. 248–253 (October 2007)Google Scholar
- 2.Alaraj, A., Munro, M.: An Efficient Fair Exchange Protocol that Enforces the Merchant to be Honest. In: Proceedings of IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing 2007, CollaborateCom 2007, New York, pp. 196–202 (November 2007)Google Scholar
- 3.Asokan, N., Schunter, M., Waidner, M.: Optimistic Protocols for Fair Exchange. In: Proc. Fourth ACM Conf. Computer and Communication Security, Zurich, Switzerland, pp. 8–17 (April 1997)Google Scholar
- 5.Ezhilchelvan, P., Shrivastava, S.: A Family of Trusted Third Party Based Fair-Exchange Protocols. IEEE transactions on dependable and secure computing 2(4) (October-December 2005)Google Scholar
- 6.Ketchpel, S.: Transaction Protection for Information Buyers and Sellers. In: Proceedings of the Dartmouth Institute for Advanced Graduate Studies 1995: Electronic Publishing and the Information Superhighway, Boston, USA (1995)Google Scholar
- 7.Nenadic, A., Zhang, N., Cheetham, B., Goble, C.: RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption. Journal of Universal Computer Science 11(1), 175–192 (2005)Google Scholar
- 8.Pagnia, H., Vogt, H., Gärtner, F.: Fair Exchange. The Computer Journal 46(1) (2003)Google Scholar
- 11.Public-Key Infrastructure (X.509), The PKIX working group (accessed on 08-06-2007), http://www.ietf.org/html.charters/pkix-charter.html
- 13.Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public- key cryptosystems. Commun. ACM, 120–126 (1978)Google Scholar
- 14.Ferguson, N., Schneier, B.: Practical cryptography. Wiley, Indianpolis (2003)Google Scholar
- 15.Alaraj, A., Munro, M.: An e-Commerce Fair Exchange Protocol that Enforces the Customer to be Honest. International Journal of Product Lifecycle Management, IJPLM (to appear)Google Scholar