Skip to main content

Solving Bao’s Colluding Attack in Wang’s Fair Payment Protocol

  • Conference paper
  • 968 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4277))

Abstract

An electronic purchase is an essential operation of electronic commerce. Fairness in the exchange of money and product, as well as anonymity of the buyer, are desirable features. In Asiacrypt 2003, C.H. Wang [8] presented a purchase protocol satisfying both anonymity and fairness, adapting the anonymous payment system of Brands [2], using a restrictive confirmation signature scheme. Later, In Asiacrypt 2004, Feng Bao [1] demonstrated that Wang’s protocol [8] can be vulnerable to attacks produced by colluding users, and he affirmed that the protocol cannot be corrected due to the anonymity of the protocol. We will show that it is possible to correct Wang’s protocol in order to avoid colluding attacks. We present a solution that modifies slightly the original protocol, maintaining the anonymity and untraceability of the original version. Finally, we discuss the convenience to achieve the property of timeliness.

An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bao, F.: Colluding attacks to a payment protocol and two signature exchange schemes. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 417–429. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  2. Brands, S.: Untraceable off-line cash in wallet with observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 302–318. Springer, Heidelberg (1994)

    Google Scholar 

  3. Camp, J., Harkavy, M., Tygar, J.D., Yee, B.: Anonymous atomic transactions. In: 2nd USENIX workshop on electronic commerce, pp. 123–133 (1996)

    Google Scholar 

  4. Jakobsson, M.: Ripping coins for a fair exchange. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 220–230. Springer, Heidelberg (1995)

    Google Scholar 

  5. Payeras, M., Ferrer, J., Huguet, L.: Anonymous Payment in a Fair E-commerce Protocol With Verifiable TTP. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol. 3592, pp. 60–69. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Schuldt, H., Popovivi, A., Schek, H.: Execution guarantees in electronic commerce payments. In: Saake, G., Schwarz, K., Türker, C. (eds.) FoMLaDO 1999. LNCS, vol. 1773, Springer, Heidelberg (2000)

    Google Scholar 

  7. Tygar, J.D.: Atomicity in electronic commerce. In: 15th annual ACM symposium on principles of distributed computing, pp. 8–26 (1996)

    Google Scholar 

  8. Wang, C.H.: Untraceable fair network payment protocol with off-line TTP. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 173–187. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Xu, S., Yung, M., Zhang, G., Zhu, H.: Money conservation via atomicity in fair off-line e-cash. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol. 1729, pp. 14–31. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Payeras-Capellà, M.M., Gomila, J.L.F., Rotger, L.H. (2006). Solving Bao’s Colluding Attack in Wang’s Fair Payment Protocol. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_69

Download citation

  • DOI: https://doi.org/10.1007/11915034_69

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48269-7

  • Online ISBN: 978-3-540-48272-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics