Advertisement

A Fair Transaction Protocol with an Offline Semi-Trusted Third Party

  • Wang Qian
  • Su Qi
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 4)

Abstract

Trusted Third Party (TTP) must be completely trustworthy when it is used in a transaction protocol to achieve fairness. But in previous works, most of the proposed protocols depend on certain strong assumptions about the third party trust, not considering possible misbehaviors by the third party and conspiracy within the main parties to some extent. In this paper, a fair transaction protocol using an offline STTP (semi-trusted third party) is proposed, which is based on the idea of RBAC(Role-Based Access Control). In the novel protocol, STTP also avoids misbehaviors on its own or conspiracy with either of the main participants by adopting interactive validation signature protocol. Meanwhile, the proposed protocol is analyzed for its security and efficiency. The results of the analysis show that it not only provides improved security, but also features high efficiency and practicability.

Keywords

Dispute Resolution Certification Authority Trust Third Party Oblivious Transfer Fair Exchange 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Vogt, H., Pagnia, H., Gärtner, F.C.: Modular Fair Exchange Protocols for Electronic Commerce (1999), http://citeseerx.ist.psu.edu/viewdoc/summary?doi=?doi=10.1.1.39.5475 (Accessed 20 April 2010)
  2. 2.
    Zhou, J., Gollmann, D.: Certified electronic mail. LNCS. Springer, Heidelberg (1994)Google Scholar
  3. 3.
    Tzeng, W.-G.: Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters. IEEE Trans. Comput. 53, 232–240 (2004)CrossRefGoogle Scholar
  4. 4.
    Ateniese, G.: Verifiable encryption of digital signatures and applications. ACM Trans. Inf. Syst. Secur. 7, 1–20 (2004)CrossRefGoogle Scholar
  5. 5.
    Zhang, N., Shi, Q., Merabti, M., et al.: Autonomous mobile agent based fair exchange. Comput. Netw. 46, 751–770 (2004)zbMATHCrossRefGoogle Scholar
  6. 6.
    Bürki, H., Pfitzmann, A.: Value exchange systems enabling security and unobservability. Computers and Security (1990), doi:10.1016/0167-4048(90)90114-9Google Scholar
  7. 7.
    Franklin, M., Reiter, M.: Fair exchange with a semi-trusted third party (1997), http://doi.acm.org/10.1145/266420.266424 (Accessed 20 April 2010)
  8. 8.
    Sirivianos, M., Yang, X., Jarecki, S.: Robust and efficient incentives for cooperative content distribution. IEEE/ACM Transactions on Networking 17, 1766–1779 (2009)CrossRefGoogle Scholar
  9. 9.
    Zhang, N., Shi, Q., Merabti, M.: An efficient protocol for anonymous and fair document exchange. Comput. Netw. 41, 19–28 (2003)zbMATHCrossRefGoogle Scholar
  10. 10.
    Mao, W., Paterson, K.: Convertible Undeniable Standard RSA Signatures (2000), http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.3064

Copyright information

© Springer Berlin Heidelberg 2010

Authors and Affiliations

  • Wang Qian
    • 1
  • Su Qi
    • 1
  1. 1.School of BusinessSun Yat-Sen UniversityGuangzhouChina

Personalised recommendations