skip to main content
article
Free Access

Signing electronic contracts

Published:01 September 2000Publication History
Skip Abstract Section

Abstract

Electronic commerce faces the problem of signing electronic contracts. Three approaches for handling electronic contracts include 1) no trusted third party protocols, 2) strongly-trusted third party protocols and 3) weakly-trusted third party protocols. A secondary problem facing electronic commerce is self-enforcing contract design.

References

  1. 1 Asokan, N. , Shoup, V, and Waidner, M. Optimistic Fair Exchange of Digital Signatures. In Proceedings of EUROCRYPT '98]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 Boyko, V. The Security Properties of OAEP as an All-or-nothing Transform. In Proceedings of CRYPTO '99. Springer-Verlag LNCS 1666 1999, see also http://theory.lcs.mit.edu/~boyko/aont-oaep/paper.ps]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Jakobsson, M., MacKenzie, P, and Garay, J. Abuse-Free Optimistic Contract Signing. In Proceedings of CRYPTO '99 Springer-Verlag LNCS 1666 1999, pp. 406-416.]]Google ScholarGoogle Scholar
  4. 4 Merkle, R. Secure Communications over insecure channels. Communications of the ACM 21:294-299, April 1978.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 Micali, S. Certified E-mail with Invisible Post Offices. Lecture at RSA Security Conference 1997.]]Google ScholarGoogle Scholar
  6. 6 Rabin, M.O. Transaction protection by beacons. Journal of Computer and System Sciences, 27(2):256-267, October 1983]]Google ScholarGoogle ScholarCross RefCross Ref
  7. 7 Rivest, R. All-or-nothing encryption and the package transform. In Eli Biham, editor, Fast Software Encryption : 4th International Workshop. Springer-Verlag LNCS 1267 p.210-218.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 Rivest, R. Shamir, A. and Wagner, D. Time-lock puzzles and time-release crypto. MIT LCS tech report TR-684, February 1996. http://www.cs.berkeley.edu/~daw/papers/timelock.ps]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 Schneier, B. and Riordan, J. A Certified E-Mail Protocol with No Trusted Third Party. 13th Annual Computer Security Applications Conference, ACM Press, December 1998 http://www.counterpane.com/certified-email.html]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 V. Shmatikov, J. Mitahell. Analysis of Abuse-Free Contract Signing. Proceedings of Financial Cryptography 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 Tygar, D. Atomicity in Electronic Commeace. In Internet Besieged. Addison-Wesley and ACM Press. October 1997, pages 389-406. (A longer, earlier version appeared in Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, May 1996, pages. 8-26.) See also http://www.cs.berkeley.edu/~tygar/recommend.html]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12 The Uniform Commercial Code of the United States http://www.law.cornell.edu/ucc/ucc.table.html]]Google ScholarGoogle Scholar

Index Terms

  1. Signing electronic contracts

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image XRDS: Crossroads, The ACM Magazine for Students
        XRDS: Crossroads, The ACM Magazine for Students  Volume 7, Issue 1
        September 2000
        70 pages
        ISSN:1528-4972
        EISSN:1528-4980
        DOI:10.1145/351092
        Issue’s Table of Contents

        Copyright © 2000 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 September 2000

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format