Skip to main content

On Secure Orders in the Presence of Faults

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4116))

Abstract

We present specifications and provably-secure protocol, for fully automated resolution of disputes between a provider of digital goods and services, and its customers. Disputes may involve the timely receipt of orders and goods, due to communication failures and malicious faults, as well as disputes on the fitness of the goods to the order. Our design is a part of a layered architecture for secure e-commerce applications [1], with precise yet general-purpose interfaces, agreements and validation functions (e.g. automatically resolving disputes on quality or fitness of goods). The modular design of the protocol and specifications, allows usage as an underlying service to different e-commerce, e-banking and other distributed systems. Our protocol operates efficiently, reliably and securely under realistic failure and delay conditions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Herzberg, A., Yoffe, I.: Layered Architecture for Secure E-Commerce Applications. In: SECRYPT 2006 - International Conference on Security and Cryptography. INSTICC Press (to appear, 2006)

    Google Scholar 

  2. Rivest, R., Shamir, A.: PayWord and MicroMint: Two Simple Micropayment Schemes. In: Proceedings of the International Workshop on Security Protocols, pp. 69–87 (1996)

    Google Scholar 

  3. Micali, S., Rivest, R.: Micropayments revisited. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, p. 149. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Herzberg, A.: Micropayments. In: Payment technologies for E-commerce, Ch. 13. Springer, Heidelberg (2003)

    Google Scholar 

  5. Chaum, D.: Blind Signatures for Untraceable Payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology - Proceedings of CRYPTO 1982, pp. 199–203. Plenum, New York (1983)

    Google Scholar 

  6. Bellare, M., Garay, J., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Herrenweghen, E.V., Waidner, M.: Design, Implementation and Deployment of the iKP Secure Electronic Payment System. Journal on Selected Areas in Communication, special issue on Network Security 18, 611–627 (2000)

    Google Scholar 

  7. Cox, B., Tygar, J.D., Sirbu, M.: NetBill security and Transaction Protocol. In: The First USENIX Workshop on Electronic Commerce, pp. 77–88 (1995)

    Google Scholar 

  8. Lacoste, G., Pfitzmann, B., Steiner, M., Waidner, M. (eds.): SEMPER 2000. LNCS, vol. 1854. Springer, Heidelberg (2000)

    Google Scholar 

  9. Nenadic, A., Zhang, N.: Non-repudiation and Fairness in Electronic Data Exchange. In: Proceedings of 5th International Conference on Enterprise Information Systems (ICEIS), Angers, France, pp. 55–62 (2003)

    Google Scholar 

  10. Pfitzmann, B., Schunter, M., Waidner, M.: Provably Secure Certified Mail. In IBM Research Report RZ 3207 (#93253), IBM Research Division, Zurich (2000)

    Google Scholar 

  11. Ray, I., Ray, I.: Fair exchange in E-commerce. SIGecom Exch. 3(2), 9–17 (2002)

    Article  Google Scholar 

  12. Kremer, S., Markowitch, O.: Fair Multi-Party Non-Repudiation Protocols. International Journal on Information Security 1(4), 223–235 (2003)

    Article  Google Scholar 

  13. Zhou, J., Deng, R.H., Bao, F.: Evolution of Fair Non-repudiation with TTP. In: Pieprzyk, J.P., Safavi-Naini, R., Seberry, J. (eds.) ACISP 1999. LNCS, vol. 1587, pp. 258–269. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  14. Kremer, S., Markowitch, O., Zhou, J.: An Intensive Survey of Non-repudiation Protocols. Computer Communications 25(17), 1606–1621 (2002)

    Article  Google Scholar 

  15. Herzberg, A.: The Layered Adversarial Specifications Framework (in progress) (2006)

    Google Scholar 

  16. Herzberg, A.: Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer. Cryptology ePrint Archive, Report 2002/084 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Herzberg, A., Yoffe, I. (2006). On Secure Orders in the Presence of Faults. In: De Prisco, R., Yung, M. (eds) Security and Cryptography for Networks. SCN 2006. Lecture Notes in Computer Science, vol 4116. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11832072_9

Download citation

  • DOI: https://doi.org/10.1007/11832072_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38080-1

  • Online ISBN: 978-3-540-38081-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics