Reference Hub5
Fair Electronic Exchange Based on Fingerprint Biometrics

Fair Electronic Exchange Based on Fingerprint Biometrics

Harkeerat Bedi, Li Yang
Copyright: © 2009 |Volume: 3 |Issue: 3 |Pages: 31
ISSN: 1930-1650|EISSN: 1930-1669|ISSN: 1930-1650|EISBN13: 9781616920678|EISSN: 1930-1669|DOI: 10.4018/jisp.2009100705
Cite Article Cite Article

MLA

Bedi, Harkeerat, and Li Yang. "Fair Electronic Exchange Based on Fingerprint Biometrics." IJISP vol.3, no.3 2009: pp.76-106. http://doi.org/10.4018/jisp.2009100705

APA

Bedi, H. & Yang, L. (2009). Fair Electronic Exchange Based on Fingerprint Biometrics. International Journal of Information Security and Privacy (IJISP), 3(3), 76-106. http://doi.org/10.4018/jisp.2009100705

Chicago

Bedi, Harkeerat, and Li Yang. "Fair Electronic Exchange Based on Fingerprint Biometrics," International Journal of Information Security and Privacy (IJISP) 3, no.3: 76-106. http://doi.org/10.4018/jisp.2009100705

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Fair exchange between two parties can be defined as an instance of exchange such that either both parties obtain what they expected or neither one does. Protocols that facilitate such transactions are known as “fair exchange protocols”. We analyze one such protocol by Micali that demonstrates fair contract signing, where two parties exchange their commitments over an already negotiated contract. In this journal we show that Micali’s protocol is not completely fair and demonstrate the possibilities for one party cheating by obtaining the other party’s commitment and not offer theirs. A revised version of this protocol by Bao provides superior fairness by handling the above mentioned weakness but fails to handle the possibility of a replay attack. Our proposed protocol improves upon Bao’s protocol by addressing the weakness that leads to a replay attack. We also demonstrate a software implementation of our system which provides fair contract signing along with properties like user authentication achieved through the use of a fingerprint based authentication system and features like confidentiality, data-integrity and non-repudiation through implementation of hybrid cryptography and digital signatures algorithms based on Elliptic Curve Cryptography.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.