Abstract
Electronic commerce faces the problem of signing electronic contracts. Three approaches for handling electronic contracts include 1) no trusted third party protocols, 2) strongly-trusted third party protocols and 3) weakly-trusted third party protocols. A secondary problem facing electronic commerce is self-enforcing contract design.
- 1 Asokan, N. , Shoup, V, and Waidner, M. Optimistic Fair Exchange of Digital Signatures. In Proceedings of EUROCRYPT '98]]Google ScholarDigital Library
- 2 Boyko, V. The Security Properties of OAEP as an All-or-nothing Transform. In Proceedings of CRYPTO '99. Springer-Verlag LNCS 1666 1999, see also http://theory.lcs.mit.edu/~boyko/aont-oaep/paper.ps]] Google ScholarDigital Library
- 3 Jakobsson, M., MacKenzie, P, and Garay, J. Abuse-Free Optimistic Contract Signing. In Proceedings of CRYPTO '99 Springer-Verlag LNCS 1666 1999, pp. 406-416.]]Google Scholar
- 4 Merkle, R. Secure Communications over insecure channels. Communications of the ACM 21:294-299, April 1978.]] Google ScholarDigital Library
- 5 Micali, S. Certified E-mail with Invisible Post Offices. Lecture at RSA Security Conference 1997.]]Google Scholar
- 6 Rabin, M.O. Transaction protection by beacons. Journal of Computer and System Sciences, 27(2):256-267, October 1983]]Google ScholarCross Ref
- 7 Rivest, R. All-or-nothing encryption and the package transform. In Eli Biham, editor, Fast Software Encryption : 4th International Workshop. Springer-Verlag LNCS 1267 p.210-218.]] Google ScholarDigital Library
- 8 Rivest, R. Shamir, A. and Wagner, D. Time-lock puzzles and time-release crypto. MIT LCS tech report TR-684, February 1996. http://www.cs.berkeley.edu/~daw/papers/timelock.ps]] Google ScholarDigital Library
- 9 Schneier, B. and Riordan, J. A Certified E-Mail Protocol with No Trusted Third Party. 13th Annual Computer Security Applications Conference, ACM Press, December 1998 http://www.counterpane.com/certified-email.html]] Google ScholarDigital Library
- 10 V. Shmatikov, J. Mitahell. Analysis of Abuse-Free Contract Signing. Proceedings of Financial Cryptography 2000.]] Google ScholarDigital Library
- 11 Tygar, D. Atomicity in Electronic Commeace. In Internet Besieged. Addison-Wesley and ACM Press. October 1997, pages 389-406. (A longer, earlier version appeared in Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, May 1996, pages. 8-26.) See also http://www.cs.berkeley.edu/~tygar/recommend.html]] Google ScholarDigital Library
- 12 The Uniform Commercial Code of the United States http://www.law.cornell.edu/ucc/ucc.table.html]]Google Scholar
Index Terms
- Signing electronic contracts
Recommendations
A fair protocol for signing contracts
Two parties, A and B, want to sign a contract C over a communication network. To do so, they must simultaneously exchange their commitments to C. Since simultaneous exchange is usually impossible in practice, protocols are needed to approximate ...
Two-round Multi-Party Contract Signing
WKDD '10: Proceedings of the 2010 Third International Conference on Knowledge Discovery and Data MiningA multi-party contract signing (MPCS) protocol allows a set of parties to exchange messages with each other to reach a state in which either each of them has a pre-agreed contract text signed by all the others, or none of them does. A good MPCS protocol ...
A randomized protocol for signing contracts
Randomized protocols for signing contracts, certified mail, and flipping a coin are presented. The protocols use a 1-out-of-2 oblivious transfer subprotocol which is axiomatically defined.
The 1-out-of-2 oblivious transfer allows one party to transfer ...
Comments