Abstract
In the contract-signing problem, participants wish to sign a contract m in such a way that either all participants obtain each others’ signatures, or nobody does. A contract-signing protocol is optimistic if it relies on a trusted third party, but only uses it when participants misbehave (e.g., try to cheat, or simply crash).
We construct an efficient general multi-party optimistic contract-singing protocol. The protocol is also abuse-free, meaning that at no point can a participant prove to others that he is capable of choosing whether to validate or invalidate the contract. This is the first abuse-free optimistic contract-signing protocol that has been developed for n > 3 parties. We also show a linear lower bound on the number of rounds of any n-party optimistic contract-signing protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
N. Asokan, B. Baum-Waidner, M. Schunter, and M. Waidner. Optimistic synchronous multi-party contract signing. IBM Research Report RZ3089, 1998.
N. Asokan, M. Schunter, and M. Waidner. Optimistic protocols for fair exchange. In ACM Conf. on Computer and Comm. Security’ 97, pp. 6–17.
N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. In IEEE Symp. on Research in Security and Privacy, pp. 86–99, 1998.
N. Asokan, V. Shoup, and M. Waidner. Fair exchange of digital signatures. In EUROCRYPT’ 98, pp. 591–606.
B. Baum-Waidner and M. Waidner. Optimistic asynchronous multi-party contract signing. IBM Research Report RZ3078, 1998.
M. Blum. How to exchange (secret) keys. ACM Transactions on Computer Systems, 1(2):175–193, May 1983.
M. Blum. Coin flipping by telephone: A protocol for solving impossible problems. In CRYPTO 81, pp. 11–15.
H. Bürk and A. Pfitzmann. Value exchange systems enabling security and unobservability. Computers and Security, 9:715–721, 1990.
D. Chaum. Blind signatures for untraceable payments. In CRYPTO 82, pp. 199–203.
D. Chaum. Designated confirmer signatures. In EUROCRYPT 94, pp. 86–91.
B. Cox, J. D. Tygar, and M. Sirbu. Netbill security and transaction protocol. In First USENIX Workshop on Electronic Commerce, pp. 77–88, 1995.
I. Damgård. Practical and provably secure release of a secret and exchange of signatures. J. of Cryptology, 8(4):201–222, Autumn 1995.
R. Deng, L. Gong, A. Lazar, and W. Wang. Practical protocols for certified electronic mail. J. of Network and Systems Management, 4(3), 1996.
S. Even. A protocol for signing contracts. ACM SIGACT News, 15(1):34–39, 1983.
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637–647, June 1985.
M. Fischer, N. Lynch, and M. Paterson. Impossibility of distributed commit with one faulty process. Journal of the ACM, 32(2), 1985.
M. Franklin and M. Reiter. Fair exchange with a semi-trusted third party. In ACM Conf. on Computer and Comm. Security’ 97, pp.1–5.
J. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. To appear in CRYPTO 99, August 1999.
O. Goldreich. A simple protocol for signing contracts. In CRYPTO 83, pp. 133–136.
M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In EUROCRYPT 96, pp. 143–154.
S. Micali. Certified e-mail with invisible post offices. Presented at the 1997 RSA Security Conference, 1997.
M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27(2):228–234, 1980.
B. Pfitzmann, M. Schunter, and M. Waidner. Optimal efficiency of optimistic contract signing. In PODC’ 98, pp. 113–122.
C. P. Schnorr. Efficient identification and signatures for smart cards. In CRYPTO’89, pp. 239–252.
A. Silberschatz, H. Korth, and S. Sudarshan. Database System Concepts. McGraw-Hill, 1997.
M. Waidner. Personal communication.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Garay, J.A., MacKenzie, P. (1999). Abuse-Free Multi-party Contract Signing. In: Jayanti, P. (eds) Distributed Computing. DISC 1999. Lecture Notes in Computer Science, vol 1693. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48169-9_11
Download citation
DOI: https://doi.org/10.1007/3-540-48169-9_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66531-1
Online ISBN: 978-3-540-48169-0
eBook Packages: Springer Book Archive