How to protect exchanged secrets in the fair exchange protocol with off-line TTP

被引:9
|
作者
Wang, Chih-Hung [1 ]
Yin, Chih-Heng
Juan, Chieh-His
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi, Taiwan
[2] IShou Univ, Dept Informat Management, Kaohsiung, Taiwan
关键词
cryptography; network security; fair exchange; semi-trusted third party; electronic commerce;
D O I
10.1016/j.compeleceng.2006.01.021
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The most efficient approach to a fair exchange is to use an off-line trusted third party (TTP for short) who gets involved only when a dispute between two parties occurs. However, exchanged secrets that are not protected properly may be exposed to the TTP when one of these two parties asks the TTP to mediate the dispute. The first work to protect exchanged secrets from TTP's misuse was proposed by Franklin and Reiter in 1997. They provided an on-line semi-trusted third party instead of an off-line third party for a fair exchange. Their schemes forced the TTP to take part in the protocol for all the cases, and thus, deemed to be impractical. The present paper, introduces several models, including single and multiple TTPs, to focus the attention not only on security properties, but also on reliability functions. In the single TTP mode, our new scheme can protect the exchanged data through an efficient exchange protocol, whereas in the multiple TTP mode, we proposed an approach to balance the security level with the reliability of the system. (c) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:364 / 375
页数:12
相关论文
共 50 条
  • [1] Efficient and practical fair exchange protocols with off-line TTP
    Bao, F
    Deng, RH
    Mao, WB
    1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 77 - 85
  • [2] A Fair Non-Repudiation Security Protocol with off-line TTP
    Wang, Xi
    Wen, Xiangming
    Liu, Ye
    Lin, Xinqi
    Wang, Ying
    PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATION, LOGISTICS AND INFORMATICS, 2009, : 173 - +
  • [3] Fair Security Protocols with off-line TTP
    Wang, Xi
    Wen, Xiangming
    Liang, Changxin
    Liu, Ye
    Lin, Xinqi
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT UBIQUITOUS COMPUTING AND EDUCATION, 2009, : 109 - +
  • [4] A kind of analysis method of off-line TTP fair non-repudiation protocol
    Liu, Dongmei
    Qing, Sihan
    Ma, Hengtai
    Li, Shuren
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (04): : 656 - 665
  • [5] Untraceable fair network payment protocols with off-line TTP
    Wang, CH
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 173 - 187
  • [6] Generic Fair Non-Repudiation Protocols with Transparent Off-Line TTP
    Wang, Guilin
    APPLIED PUBLIC KEY INFRASTRUCTURE, 2005, 128 : 51 - 65
  • [7] New protocol for certified mail based on off-line conditional TTP
    Shen, Wei
    Jisuanji Gongcheng/Computer Engineering, 2004, 30 (07):
  • [8] A Fair-Exchange Protocol Based on Off-line Semi-Trusted Third Party
    Wu Qingtao
    zhang Hongyi
    Pu Jiexin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 208 - 212
  • [9] Analysis and improvement of ZG off-line TTP non-repudiation protocol
    Liu, Dong-Mei
    Qing, Si-Han
    Li, Peng-Fei
    Li, Shang-Jie
    Tongxin Xuebao/Journal on Communications, 2009, 30 (11 A): : 44 - 51
  • [10] Atomic and anonymous e-Cash transaction protocol with off-line TTP
    王茜
    李朝阳
    杨德礼
    Journal of Harbin Institute of Technology, 2004, (05) : 558 - 563