Skip to main content

Fair Exchange of Digital Signatures with Offline Trusted Third Party

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2229))

Included in the following conference series:

Abstract

In this paper we show how fair exchange of digital signatures can be made possible without a separate verifiable encryption. This means that the fair exchange protocol can be established based on an existing signature algorithm without modification, except that the users need to get a ticket from an off-line trusted third party to enable the fair exchange. The trusted third party is needed to make a judgment only when there is a dispute. Explicit protocols based on different digital signature algorithms are proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N. Asokan, V. Shoup, M. Waidner, “Optimistic fair exchange of digital signatures (extended abstract)”, Advances in Cryptology-Eurocrypt’98, K. Nyberg(Ed.), LNCS 1403, Springer-Verlag, 1998, pp.591–606.

    Chapter  Google Scholar 

  2. I.B. Damgard, “Practical and provably secure release of a secret and exchange of signatures”, Advances in Cryptology-Eurocrypt’93, T. Helleseth (ed.), LNCS 765, Springer-Verlag, 1994, pp.200–217.

    Google Scholar 

  3. C. Boyd and E. Foo, “Off-line fair payment protocol usingcon vertible signatures”, Advances in Cryptology-Asiacrypt’98, LNCS 1514, Springer-Verlag, 1998.

    Chapter  Google Scholar 

  4. T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Transactions on Information Theory, Vol. IT-31, No.4, 1985, pp.469–472.

    Article  MathSciNet  Google Scholar 

  5. FIPS PUB 186, “Digital signature standard”, available on-line at http://bilbo.isu.edu/security/isl/fips186.html.

  6. M.K. Franklin and M.K. Reiter, “Verifiable signature sharing”, Advances in Cryptology — Eurocrypt’95, L.C. Guillou, J.J. Quisquater (eds.), LNCS 921, Springer-Verlag, 1995, pp.50–63.

    Google Scholar 

  7. M.K. Franklin and M.K. Reiter, “Fair exchange with a semi-trusted third party”, in Proceedings of the 4th ACM Conference on Computer and Communication Security, April 1997, pp.1–5.

    Google Scholar 

  8. R. Gennaro, H. Krawczyk, and T. Rabin, “RSA-based undeniable signatures”, Advances in Cryptology — Crypto’97, B.S. Kaliski Jr. (Ed.), LNCS 1294, Springer-Verlag, 1997, pp.132–149.

    Chapter  Google Scholar 

  9. W. Mao, “Publicly verifiable partial key escrow”, Information and Communications Security, Proceedings, Y. Han, T. Okamoto, S. Qing(Eds.), LNCS 1334, Springer-Verlag1997, pp.409–413.

    Google Scholar 

  10. W. Mao, “Verifiable escrowed signature”, Information Security and Privacy, LNCS1270, Springer-Verlag, 1997, pp.240–248.

    Chapter  Google Scholar 

  11. T. Okamoto and K. Ohta, “How to simultaneously exchange secrets by general assumption”, in Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp.184–192.

    Google Scholar 

  12. C.P. Schnorr, “Efficient signature generation for smart cards”, Journal of Cryptology, Vol.4, No.3, 1991, pp.161–174.

    Article  MATH  MathSciNet  Google Scholar 

  13. M. Stadler, “Publicly verifiable secret sharing”, Advances in Cryptology— Eurocrypt’ 96, U. Maurer (ed.), LNCS 1070, Springer-Verlag, 1996, pp.190–199.

    Google Scholar 

  14. M. Stadler, Cryptographic Protocols for Revocable Privacy, Ph.D. thesis, Swiss Federal Institute of Technology, Zürich 1996.

    Google Scholar 

  15. J. Zhou and D. Gollman, “A fair non-repudiation protocol”, in Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, 1996, IEEE Computer Press, pp.55–61.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wu, CK., Varadharajan, V. (2001). Fair Exchange of Digital Signatures with Offline Trusted Third Party. In: Qing, S., Okamoto, T., Zhou, J. (eds) Information and Communications Security. ICICS 2001. Lecture Notes in Computer Science, vol 2229. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45600-7_52

Download citation

  • DOI: https://doi.org/10.1007/3-540-45600-7_52

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42880-0

  • Online ISBN: 978-3-540-45600-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics