Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3483))

Included in the following conference series:

Abstract

Electronic exchange is widely used in e-commerce systems. This paper mainly discusses abuse-freeness in general item exchange protocol for two parties. Based on convertible signature scheme and adapted designated verifier proof, an efficient item exchange protocol is proposed to satisfy many interesting requirements including fairness, timeliness and strong abuse-freeness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Asokan, N., Schunter, M., Waidner, M.: Optimistic protocols for fair exchange. In: Proceedings of the fourh ACM Conference on Computer and Communications Security. ACM Press, New York (1997)

    Google Scholar 

  2. Boyd, C., Foo, E.: Off-line Fair Payment Protocols using Convertible Signatures. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 271–285. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  3. Chadha, R., Kanovich, M., Scedrov, A.: Inductive methods and contract-signing protocols. In: Proceedings of 8-th ACM confererence on Computer and Communications Security (CCS-8). ACM Press, New York (2001)

    Google Scholar 

  4. Chadha, R., Mitchell, J., Scedrov, A., Shmatikov, V.: Contract signing, optimism and advantage. In: Amadio, R.M., Lugiez, D. (eds.) CONCUR 2003. LNCS, vol. 2761. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Garay, J., Jakobsson, M., MacKenzie, P.: Abuse-free optimistic contract signing. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666. Springer, Heidelberg (1999)

    Google Scholar 

  6. Gennaro, R., Krawczyk, H., Rabin, T.: RSA-based undeniable signatures. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 132–149. Springer, Heidelberg (1997)

    Google Scholar 

  7. Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)

    Google Scholar 

  8. Markowitch, O., Saeednia, S.: Optimistic fair-exchange with transparent signature recovery. In: Proceedings of 5th International Conference, Financial Cryptography 2001. Springer, Heidelberg (2001)

    Google Scholar 

  9. Micali, S.: Certified e-mail with invisible post offices. In: Available from author: an invited presentation at the RSA 1997 conference (1997)

    Google Scholar 

  10. Pagnia, H., Gartner, F.C.: On the impossibility of fair exchange without a trusted third party. Tech. Rep. TUD-BS-1999-02 (March), Darmstadt University of Technology (1999)

    Google Scholar 

  11. Pagnia, H., Vogt, H., Gärtner, F.C., Wilhelm, U.G.: Solving Fair Exchange with Mobile Agents. In: Kotz, D., Mattern, F. (eds.) MA 2000, ASA/MA 2000, and ASA 2000. LNCS, vol. 1882, pp. 57–72. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  12. Saeednia, S., Kremer, S., Markowitch, O.: An efficient strong designated verifier scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. Wang, H., Guo, H.: Fair Payment Protocols for E-Commerce. In: Proceedings of Fourth IFIP Conference on e-Commerce, e-Business, and e-Government (I3E 2004). Building the ESociety: E-Commerce, E-Business and E-Government. Kluwer Academic Publishers, Dordrecht (2004)

    Google Scholar 

  14. Wang, H., Guo, H., Lin, M.: New Fair Payment Protocols. In: Proceedings of 1st International Conference on E-business and Telecommunication Networks (ICETE 2004). INSTICC Press (2004)

    Google Scholar 

  15. Zhou, J., Gollmann, D.: An Efficient Non-repudiation Protocol. In: Proceedings of 1997 IEEE Computer Security Foundations Workshop, CSFW 10 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, H., Guo, H., Yin, J., He, Q., Lin, M., Zhang, J. (2005). Abuse-Free Item Exchange. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3483. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424925_107

Download citation

  • DOI: https://doi.org/10.1007/11424925_107

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25863-6

  • Online ISBN: 978-3-540-32309-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics