Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator

被引:8
|
作者
Shao, Zuhua [1 ]
机构
[1] Zhejiang Univ Sci & Technol, Hangzhou 310023, Zhejiang, Peoples R China
关键词
Fair exchange protocol; Schnorr signatures; Discrete logarithm; Random oracle model; VERIFIABLY ENCRYPTED SIGNATURES; AGGREGATE; SECURITY; MULTISIGNATURES; SCHEME;
D O I
10.1016/j.compeleceng.2010.03.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose an optimistic fair exchange protocol of Schnorr signatures with a semi-trusted adjudicator In this protocol we enforce the adjudicator accountability in the protocol to relax excessive reliance on the trust of the adjudicator so that the adjudicator only needs to be trusted by the signer We present a security model and then show that the protocol is strong EUF-CMA secure under the standard Discrete Logarithm (DL) assump non in the random oracle model Finally we compare the performance of the fair exchange protocol of Schnorr signatures (C) 2010 Elsevier Ltd All rights reserved
引用
收藏
页码:1035 / 1045
页数:11
相关论文
共 50 条
  • [1] A non-repudiation fair exchange protocol with semi-trusted third party
    [J]. 2001, Huazhong University of Science and Technology (29):
  • [2] A Fair Transaction Protocol with an Offline Semi-Trusted Third Party
    Qian, Wang
    Qi, Su
    [J]. ADVANCES IN INTELLIGENT DECISION TECHNOLOGIES, 2010, 4 : 249 - 257
  • [3] Novel Design of Fair Exchange Protocol for Semi-trusted Server and Its Application in Cloud Environment
    Wang, Chih-Hung
    Wang, Chien-Ming
    [J]. 2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2016, : 130 - 135
  • [4] A Fair-Exchange Protocol Based on Off-line Semi-Trusted Third Party
    Wu Qingtao
    zhang Hongyi
    Pu Jiexin
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 208 - 212
  • [5] Fair Private Set Intersection with a Semi-trusted Arbiter
    Dong, Changyu
    Chen, Liqun
    Camenisch, Jan
    Russello, Giovanni
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 128 - 144
  • [6] Fair Threshold Decryption with Semi-Trusted Third Parties
    Hong, Jeongdae
    Kim, Jinil
    Kim, Jihye
    Franklin, Matthew K.
    Park, Kunsoo
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 309 - +
  • [7] A watermark protocol based on the semi-trusted third party
    Duan, F
    Zhou, YP
    Hu, Y
    [J]. ACTIVE MEDIA TECHNOLOGY, 2003, : 334 - 339
  • [8] Certificate-based Fair Exchange Protocol of Schnorr Signatures in Chosen-key Model
    Shao, Zuhua
    Gao, Yipeng
    [J]. FUNDAMENTA INFORMATICAE, 2015, 141 (01) : 95 - 114
  • [9] A semi-trusted third party watermark protocol and implement framework
    Zhuang, YQ
    Wu, JQ
    Duan, F
    [J]. ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 1981 - 1984
  • [10] Encryption over Semi-trusted Database
    Kadhem, Hasan
    Amagasa, Toshiyuki
    Kitagawa, Hiroyuki
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2009, 5667 : 358 - 362