Skip to main content

Dependable Transaction for Electronic Commerce

  • Conference paper
Computational Science and Its Applications – ICCSA 2005 (ICCSA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3482))

Included in the following conference series:

  • 1396 Accesses

Abstract

Electronic transaction becomes common practice in real world business. This paper focuses on the issue of dependability in critical transactions like electronic payment, electronic contract signing. Recent fair protocols can recover transactions from network crashes, but cannot survive local system crashes. A two-party dependable transaction protocol is proposed. During the protocol, both parties can recover the transaction from network and local system failures in a transparent way, which means that after the recovery, outcome messages would be just the same as those from a successful run of the transaction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Asokan, N., Schunter, M., Waidner, M.: Optimistic protocols for fair exchange. In: Proceedings of the fourh ACM Conference on Computer and Communications Security (1997)

    Google Scholar 

  2. Dodis, Y., Reyzin, L.: Breaking and repairing optimistic fair exchange from PODC 2003. In: Proceedings of the 2003 ACM workshop on Digital rights management (2003)

    Google Scholar 

  3. Liu, P., Ning, P., Jajodia, S.: Avoiding loss of fairness owing to process crashes in fair data exchange protocols. In: Proceedings of the IEEE International Conference on Dependable Systems and Networks, Workshop on Dependability despite Malicious Faults (2000)

    Google Scholar 

  4. Markowitch, O., Kremer, S., Gollmann, D.: On Fairness in Exchange Protocols. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 451–464. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Micali, S.: Certified e-mail with invisible post offices. In: Available from author: an invited presentation at the RSA 1997 conference (1997)

    Google Scholar 

  6. Pagnia, H., Gartner, F.C.: On the impossibility of fair exchange without a trusted third party. Tech. Rep. TUD-BS-1999-02 (March), Darmstadt University of Technology (1999)

    Google Scholar 

  7. Park, J.M., Chong, E.K.P., Siegel, H.J.: Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures. In: Proceedings of the twenty-second annual symposium on Principles of distributed computing (2003)

    Google Scholar 

  8. Wang, H., Guo, H.: Fair Payment Protocols for E-Commerce. In: Proceedings of Fourth IFIP Conference on e-Commerce, e-Business, and e-Government (I3E 2004). Building the E-Society: E-Commerce, E-Business and E-Government. Kluwer academic publishers, Dordrecht (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, H., Guo, H., Lin, M., Yin, J., He, Q., Zhang, J. (2005). Dependable Transaction for Electronic Commerce. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424857_76

Download citation

  • DOI: https://doi.org/10.1007/11424857_76

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25862-9

  • Online ISBN: 978-3-540-32045-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics