A Fair Transaction Protocol with an Offline Semi-Trusted Third Party

被引:0
|
作者
Qian, Wang [1 ]
Qi, Su [1 ]
机构
[1] Sun Yat Sen Univ, Sch Business, Guangzhou 510275, Guangdong, Peoples R China
关键词
EXCHANGE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Trusted Third Party (TTP) must be completely trustworthy when it is used in a transaction protocol to achieve fairness. But in previous works, most of the proposed protocols depend on certain strong assumptions about the third party trust, not considering possible misbehaviors by the third party and conspiracy within the main parties to some extent. In this paper, a fair transaction protocol using an offline STTP (semi-trusted third party) is proposed, which is based on the idea of RBAC(Role-Based Access Control). In the novel protocol, STTP also avoids misbehaviors on its own or conspiracy with either of the main participants by adopting interactive validation signature protocol. Meanwhile, the proposed protocol is analyzed for its security and efficiency. The results of the analysis show that it not only provides improved security, but also features high efficiency and practicability.
引用
收藏
页码:249 / 257
页数:9
相关论文
共 50 条
  • [1] A non-repudiation fair exchange protocol with semi-trusted third party
    [J]. 2001, Huazhong University of Science and Technology (29):
  • [2] A watermark protocol based on the semi-trusted third party
    Duan, F
    Zhou, YP
    Hu, Y
    [J]. ACTIVE MEDIA TECHNOLOGY, 2003, : 334 - 339
  • [3] A semi-trusted third party watermark protocol and implement framework
    Zhuang, YQ
    Wu, JQ
    Duan, F
    [J]. ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 1981 - 1984
  • [4] A Fair-Exchange Protocol Based on Off-line Semi-Trusted Third Party
    Wu Qingtao
    zhang Hongyi
    Pu Jiexin
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 208 - 212
  • [5] A multi-party non-repudiation protocol with semi-trusted third party
    Wang, CF
    Ge, JH
    Du, XJ
    Qu, J
    Zhao, TS
    Yang, SY
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 188 - 191
  • [6] Fair Threshold Decryption with Semi-Trusted Third Parties
    Hong, Jeongdae
    Kim, Jinil
    Kim, Jihye
    Franklin, Matthew K.
    Park, Kunsoo
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 309 - +
  • [7] Proxy signature scheme with a semi-trusted third party
    Liu Peiyu
    Cui Tao
    Xu Mingying
    [J]. CEIS 2011, 2011, 15
  • [8] Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator
    Shao, Zuhua
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (06) : 1035 - 1045
  • [9] DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
    Ali, Mazhar
    Malik, Saif U. R.
    Khan, Samee U.
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (04) : 642 - 655
  • [10] Quantum Designated Verifier Signature Scheme with Semi-Trusted Third-Party
    Zhang, Ling
    Zhang, Jia-Hao
    Xin, Xiang-Jun
    Li, Chao-Yang
    Huang, Min
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2023, 62 (08)