An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest

  • Abdullah Alaraj
  • Malcolm Munro
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5219)


A new e-Commerce fair exchange protocol is presented in this paper. The protocol is for exchanging payment with digital product (such as computer software) between customer (C) and merchant (M). It makes use of Trusted Third Party (TTP) but its use is kept to minimum when disputes arise. In this respect it is an optimistic fair exchange protocol. A new idea, in which if the parties are willing to exchange then they are encouraged to be honest, is originated in this protocol. The protocol has the following features: (1) It comprises four messages to be exchanged between C and M in the exchange phase; (2) It guarantees strong fairness for both C and M so that by the end of executing the protocol both C and M will have each other’s items or no one has got anything; (3) It allows both parties (C and M) to check the correctness of the item of the other party before they send their item; (4) It resolves disputes automatically online by the help of the Trusted Third Party (TTP); and (5) The proposed protocol is efficient in that it has a low number of modular exponentiations (which is the most expensive operations) when compared to other protocols in the literature.


Dispute Resolution Exchange Phase Trusted Third Party Digital Product Modular Exponentiation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Alaraj, A., Munro, M.: An e-commerce Fair Exchange Protocol for exchanging Digital Products and Payments. In: Proceedings of IEEE ICDIM 2007, Lyon, pp. 248–253 (October 2007)Google Scholar
  2. 2.
    Alaraj, A., Munro, M.: An Efficient Fair Exchange Protocol that Enforces the Merchant to be Honest. In: Proceedings of IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing 2007, CollaborateCom 2007, New York, pp. 196–202 (November 2007)Google Scholar
  3. 3.
    Asokan, N., Schunter, M., Waidner, M.: Optimistic Protocols for Fair Exchange. In: Proc. Fourth ACM Conf. Computer and Communication Security, Zurich, Switzerland, pp. 8–17 (April 1997)Google Scholar
  4. 4.
    Ben-Or, M., Goldreich, O., Micali, S., Rivest, R.: A Fair Protocol for Signing Contracts. IEEE Trans. Information Theory 36(1), 40–46 (1990)CrossRefGoogle Scholar
  5. 5.
    Ezhilchelvan, P., Shrivastava, S.: A Family of Trusted Third Party Based Fair-Exchange Protocols. IEEE transactions on dependable and secure computing 2(4) (October-December 2005)Google Scholar
  6. 6.
    Ketchpel, S.: Transaction Protection for Information Buyers and Sellers. In: Proceedings of the Dartmouth Institute for Advanced Graduate Studies 1995: Electronic Publishing and the Information Superhighway, Boston, USA (1995)Google Scholar
  7. 7.
    Nenadic, A., Zhang, N., Cheetham, B., Goble, C.: RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption. Journal of Universal Computer Science 11(1), 175–192 (2005)Google Scholar
  8. 8.
    Pagnia, H., Vogt, H., Gärtner, F.: Fair Exchange. The Computer Journal 46(1) (2003)Google Scholar
  9. 9.
    Ray, I., Ray, I., Narasimhamurthy, N.: An Anonymous and Failure Resilient Fair-Exchange E-Commerce Protocol. Decision Support Systems 39, 267–292 (2005)CrossRefGoogle Scholar
  10. 10.
    Ray, I., Ray, I.: An Optimistic Fair Exchange E-Commerce Protocol with Automated Dispute Resolution. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol. 1875, pp. 84–93. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  11. 11.
    Public-Key Infrastructure (X.509), The PKIX working group (accessed on 08-06-2007),
  12. 12.
    Zhang, N., Shi, Q., Merabti, M., Askwith, R.: Practical and Efficient Fair Document Exchange over Networks. The Journal of Network and Computer Applications, the Elsevier Science Publisher 29(1), 46–61 (2006)zbMATHCrossRefGoogle Scholar
  13. 13.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public- key cryptosystems. Commun. ACM, 120–126 (1978)Google Scholar
  14. 14.
    Ferguson, N., Schneier, B.: Practical cryptography. Wiley, Indianpolis (2003)Google Scholar
  15. 15.
    Alaraj, A., Munro, M.: An e-Commerce Fair Exchange Protocol that Enforces the Customer to be Honest. International Journal of Product Lifecycle Management, IJPLM (to appear)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Abdullah Alaraj
    • 1
  • Malcolm Munro
    • 1
  1. 1.Department of computer scienceDurham Universitythe UK

Personalised recommendations