Skip to main content

Abuse-Free Multi-party Contract Signing

  • Conference paper
  • First Online:
Distributed Computing (DISC 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1693))

Included in the following conference series:

Abstract

In the contract-signing problem, participants wish to sign a contract m in such a way that either all participants obtain each others’ signatures, or nobody does. A contract-signing protocol is optimistic if it relies on a trusted third party, but only uses it when participants misbehave (e.g., try to cheat, or simply crash).

We construct an efficient general multi-party optimistic contract-singing protocol. The protocol is also abuse-free, meaning that at no point can a participant prove to others that he is capable of choosing whether to validate or invalidate the contract. This is the first abuse-free optimistic contract-signing protocol that has been developed for n > 3 parties. We also show a linear lower bound on the number of rounds of any n-party optimistic contract-signing protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N. Asokan, B. Baum-Waidner, M. Schunter, and M. Waidner. Optimistic synchronous multi-party contract signing. IBM Research Report RZ3089, 1998.

    Google Scholar 

  2. N. Asokan, M. Schunter, and M. Waidner. Optimistic protocols for fair exchange. In ACM Conf. on Computer and Comm. Security’ 97, pp. 6–17.

    Google Scholar 

  3. N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. In IEEE Symp. on Research in Security and Privacy, pp. 86–99, 1998.

    Google Scholar 

  4. N. Asokan, V. Shoup, and M. Waidner. Fair exchange of digital signatures. In EUROCRYPT’ 98, pp. 591–606.

    Google Scholar 

  5. B. Baum-Waidner and M. Waidner. Optimistic asynchronous multi-party contract signing. IBM Research Report RZ3078, 1998.

    Google Scholar 

  6. M. Blum. How to exchange (secret) keys. ACM Transactions on Computer Systems, 1(2):175–193, May 1983.

    Article  Google Scholar 

  7. M. Blum. Coin flipping by telephone: A protocol for solving impossible problems. In CRYPTO 81, pp. 11–15.

    Google Scholar 

  8. H. Bürk and A. Pfitzmann. Value exchange systems enabling security and unobservability. Computers and Security, 9:715–721, 1990.

    Article  Google Scholar 

  9. D. Chaum. Blind signatures for untraceable payments. In CRYPTO 82, pp. 199–203.

    Google Scholar 

  10. D. Chaum. Designated confirmer signatures. In EUROCRYPT 94, pp. 86–91.

    Google Scholar 

  11. B. Cox, J. D. Tygar, and M. Sirbu. Netbill security and transaction protocol. In First USENIX Workshop on Electronic Commerce, pp. 77–88, 1995.

    Google Scholar 

  12. I. Damgård. Practical and provably secure release of a secret and exchange of signatures. J. of Cryptology, 8(4):201–222, Autumn 1995.

    Article  MATH  Google Scholar 

  13. R. Deng, L. Gong, A. Lazar, and W. Wang. Practical protocols for certified electronic mail. J. of Network and Systems Management, 4(3), 1996.

    Google Scholar 

  14. S. Even. A protocol for signing contracts. ACM SIGACT News, 15(1):34–39, 1983.

    Article  Google Scholar 

  15. S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637–647, June 1985.

    Article  MathSciNet  Google Scholar 

  16. M. Fischer, N. Lynch, and M. Paterson. Impossibility of distributed commit with one faulty process. Journal of the ACM, 32(2), 1985.

    Google Scholar 

  17. M. Franklin and M. Reiter. Fair exchange with a semi-trusted third party. In ACM Conf. on Computer and Comm. Security’ 97, pp.1–5.

    Google Scholar 

  18. J. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. To appear in CRYPTO 99, August 1999.

    Google Scholar 

  19. O. Goldreich. A simple protocol for signing contracts. In CRYPTO 83, pp. 133–136.

    Google Scholar 

  20. M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In EUROCRYPT 96, pp. 143–154.

    Google Scholar 

  21. S. Micali. Certified e-mail with invisible post offices. Presented at the 1997 RSA Security Conference, 1997.

    Google Scholar 

  22. M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27(2):228–234, 1980.

    Article  MATH  MathSciNet  Google Scholar 

  23. B. Pfitzmann, M. Schunter, and M. Waidner. Optimal efficiency of optimistic contract signing. In PODC’ 98, pp. 113–122.

    Google Scholar 

  24. C. P. Schnorr. Efficient identification and signatures for smart cards. In CRYPTO’89, pp. 239–252.

    Google Scholar 

  25. A. Silberschatz, H. Korth, and S. Sudarshan. Database System Concepts. McGraw-Hill, 1997.

    Google Scholar 

  26. M. Waidner. Personal communication.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Garay, J.A., MacKenzie, P. (1999). Abuse-Free Multi-party Contract Signing. In: Jayanti, P. (eds) Distributed Computing. DISC 1999. Lecture Notes in Computer Science, vol 1693. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48169-9_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-48169-9_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66531-1

  • Online ISBN: 978-3-540-48169-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics