skip to main content
article

An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability

Published: 01 October 2005 Publication History

Abstract

Contract signing conducted over the Internet arouses concerns of fairness. Two signing parties exchange their signatures in a fair manner, so that no party can gain an advantage over the other. This paper will discuss the security issues of signers' privacy and reliability of the system for the contract signing protocol. The trusted third party (TTP), responsible for maintaining the fairness in the protocol, cannot get useful information about the exchanged signatures by solving the dispute between two parties. The concept of semi-trusted third party (STTP) adopted from Franklin and Reiter's paper (in 1997) can be used to reach our goal. However, Franklin and Reiter's protocol uses an on-line third party and is inapplicable to the exchange of signatures. Hence, we propose an efficient contract signing protocol with off-line STTP using the aggregate signature proposed by Boneh and Gentry. Furthermore, the use of aggregate signature and bilinear pairings will effectually promote system reliability.

References

[1]
N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signature. IEEE Journal on Selected Areas in Communications, 18:591--610, 2000.]]
[2]
F. Bao, R. H. Deng, and W. Mao. Efficient and practical fair exchange protocols with off-line TTP. In Proceedings of the 1998 IEEE Symposium on Security and Privacy, pages 77--85, Oakland, CA, May 1998. IEEE Computer Press.]]
[3]
M. Blum. How to exchange (secret) keys. ACM Transactions on Computer Systems, 1(2):175--193, 1983.]]
[4]
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In Advances in Cryptology - Proceedings of Eurocrypt 2003, Lecture Notes in Computer Science (LNCS) 2656, pages 272--293. Springer-Verlag, 2003.]]
[5]
C. Boyd and E. Foo. Off-line fair payment protocols using convertible signature. In Advances in Cryptology - Proceedings of Asiacrypt'98, pages 271--285. Springer-Verlag, 1998.]]
[6]
L. Chen. Efficient fair exchange with verifiable confirmation of signatures. In Advances in Cryptology - Proceedings of Asiacrypt'98, pages 286--299. Springer-Verlag, 1998.]]
[7]
R. H. Deng, L. Gong, A. A. Lazar, and W. Wang. Practical protocol for certified electronic mail. Journal of Network and Systems Management, 4(3):279--297, 1996.]]
[8]
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. CACM, 28(6):637--647, 1985.]]
[9]
M. K. Franklin and M. K. Reiter. Fair exchange with a semi-trusted third party. In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 1--5, Zurich, Switzerland, April 1997.]]
[10]
J. A. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. In Proceedings of Crypto'99, Lecture Notes in Computer Science (LNCS) 1666, pages 449--466. Springer-Verlag, 1999.]]
[11]
L. Gong. Increasing availability and security of an authentication service. IEEE Journal on Selected Areas in Communications, 11(5):657--662, 1993.]]
[12]
T. Okamoto and K. Ohta. How to simultaneously exchange secrets by general assumption. In Proceedings of 2nd ACM Conference on Computer and Communications Security, pages 184--192, 1994.]]
[13]
M. Stadler. Publicly verifiable secret sharing. In Advances in Cryptology - Proceedings of Eurocrtpt'96, Lecture Notes in Computer Science (LNCS) 1070, pages 190--199. Springer-Verlag, 1996.]]
[14]
J. Zhou and D. Gollmann. A fair non-repudiation protocol. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 55--61, Oakland, CA, 1996. IEEE Computer Press.]]
[15]
J. Zhou and D. Gollmann. An efficient non-repudiation protocol. In Proceedings of the 1997 IEEE Computer Security Foundations Workshop (CSFW 10), pages 126--132. IEEE CS Press, 1997.]]

Cited By

View all
  • (2011)An Identity Based Aggregate Signature from PairingsJournal of Networks10.4304/jnw.6.4.631-6376:4Online publication date: 1-Apr-2011
  • (2010)Double verifiably encrypted signature-based contract signing protocolProceedings of the First international conference on Information computing and applications10.5555/1925974.1925988(86-93)Online publication date: 15-Oct-2010
  • (2010)Double Verifiably Encrypted Signature-Based Contract Signing ProtocolProceedings of the First International Conference on Information Computing and Applications - Volume 637710.1007/978-3-642-16167-4_12(86-93)Online publication date: 15-Oct-2010
  • Show More Cited By

Index Terms

  1. An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM SIGOPS Operating Systems Review
          ACM SIGOPS Operating Systems Review  Volume 39, Issue 4
          October 2005
          93 pages
          ISSN:0163-5980
          DOI:10.1145/1088446
          Issue’s Table of Contents

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 01 October 2005
          Published in SIGOPS Volume 39, Issue 4

          Check for updates

          Author Tags

          1. bilinear pairings
          2. contract signing
          3. cryptography
          4. elliptic curves
          5. fair exchange

          Qualifiers

          • Article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)2
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 05 Mar 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2011)An Identity Based Aggregate Signature from PairingsJournal of Networks10.4304/jnw.6.4.631-6376:4Online publication date: 1-Apr-2011
          • (2010)Double verifiably encrypted signature-based contract signing protocolProceedings of the First international conference on Information computing and applications10.5555/1925974.1925988(86-93)Online publication date: 15-Oct-2010
          • (2010)Double Verifiably Encrypted Signature-Based Contract Signing ProtocolProceedings of the First International Conference on Information Computing and Applications - Volume 637710.1007/978-3-642-16167-4_12(86-93)Online publication date: 15-Oct-2010
          • (2008)An Aggregate Signature Scheme with Constant Pairing OperationsProceedings of the 2008 International Conference on Computer Science and Software Engineering - Volume 0310.1109/CSSE.2008.941(830-833)Online publication date: 12-Dec-2008
          • (2008)Fair exchange protocol of signatures based on aggregate signaturesComputer Communications10.1016/j.comcom.2007.12.03031:10(1961-1969)Online publication date: 1-Jun-2008
          • (2007)Receipt management- transaction history based trust establishmentProceedings of the 2007 ACM workshop on Digital identity management10.1145/1314403.1314417(82-91)Online publication date: 2-Nov-2007

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media