A Three-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology

被引:1
|
作者
Shiraishi, Yoshiaki [1 ]
Morii, Masakatu [1 ]
Mohri, Masami [2 ]
Miyazaki, Hitoshi [3 ]
机构
[1] Kobe Univ, Kobe, Hyogo 6578501, Japan
[2] Gifu Univ, Gifu 5011193, Japan
[3] Nagoya Inst Technol, Nagoya, Aichi 4668555, Japan
关键词
fair exchange; certified email; verifiably encrypted signature scheme; multi-party protocol;
D O I
10.1109/CSCloud.2015.64
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While many two-party fair exchange protocols have been proposed, more than three-party fair exchange protocol is required depending on a type of applications. Asokan et al. have proposed a multi-party fair exchange protocol for mesh topology. This scheme can be adapted to all kinds of topologies but requires much communication costs, which is 4n(n-1) passes in the all n-participators honest cases and 8n(2)-n-10 passes in the worst case. In previous works, more efficient and multi-functional schemes specialized for a kind of topologies have been proposed but most of these are for ring topology and star topology. Zhou et al. have proposed an efficient multi-party contract signing protocol for line topology. It is shown the two protocols such that a simple protocol which is completed with 4(n-1) passes in the all honest cases and 5n-3 passes in the worst case and an optimized protocol which is completed with 3(n-1) passes in the all honest cases and 4n-2 passes in the worst. This result means that a fair exchange protocol for line topology is efficient in a number of communications nevertheless a certified email protocol specialized for line topology has not been proposed. That is, a certified email protocol run on line topology is only a protocol for mesh proposed by Asokan et al. adapted to line topology, therefore there is large room for reducing a number of communications by specializing for a certified email protocol. In this paper, we propose a three-party certified email protocol for line topology towards a design of n-party protocol. The proposed protocol has such basic properties of certified email as fairness, non-repudiation, trusted third party invisibility and timeliness, as same as the previous works. Our scheme is completed with eight passes in the case of all honest and twelve passes in the worst. The communication cost is less than the Asokan et al.'s scheme with 24 (n=3) passes even if the all n-participators are honest.
引用
收藏
页码:260 / 265
页数:6
相关论文
共 46 条
  • [1] Optimistic fair contract signing protocol based on hybrid verifiably encrypted signature scheme
    Chen, Li
    Gu, Chunxiang
    [J]. Advances in Information Sciences and Service Sciences, 2012, 4 (12): : 46 - 54
  • [2] A novel three-party encrypted key exchange protocol
    Chang, CC
    Chang, YF
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 26 (05) : 471 - 476
  • [3] Improving the novel three-party encrypted key exchange protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. COMPUTER STANDARDS & INTERFACES, 2008, 30 (05) : 309 - 314
  • [4] A Computation-Efficient Three-Party Encrypted Key Exchange Protocol
    Lee, Cheng-Chi
    Chen, Shun-Der
    Chen, Chin-Ling
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 573 - 579
  • [5] Efficient three-party encrypted key exchange using trapdoor functions
    Lee, Tian-Fu
    Chang, I-Pin
    Wang, Ching-Cheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (11) : 1353 - 1358
  • [6] Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
    Chen, Hsing-Bai
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chang, Chin-Chen
    [J]. COMPUTER STANDARDS & INTERFACES, 2008, 30 (1-2) : 95 - 99
  • [7] Pairings Based Designated Verifier Signature Scheme for Three-Party Communication Environment
    Lin, Han-Yu
    Wu, Tzong-Sun
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 330 - +
  • [8] An Off-Line Dictionary Attack on a Simple Three-Party Key Exchange Protocol
    Nam, Junghyun
    Paik, Juryon
    Kang, Hyun-Kyu
    Kim, Ung Mo
    Won, Dongho
    [J]. IEEE COMMUNICATIONS LETTERS, 2009, 13 (03) : 205 - 207
  • [9] Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC
    Wu, Shuhua
    Zhu, Yuefei
    Pu, Qiong
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (04) : 1329 - 1343
  • [10] Privacy Preserving Three-party Authenticated Key Agreement Protocol using Smart Cards
    Park, Suyeon
    Park, Hee-Joo
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 307 - 320