How to protect exchanged secrets in the fair exchange protocol with off-line TTP

被引:9
|
作者
Wang, Chih-Hung [1 ]
Yin, Chih-Heng
Juan, Chieh-His
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi, Taiwan
[2] IShou Univ, Dept Informat Management, Kaohsiung, Taiwan
关键词
cryptography; network security; fair exchange; semi-trusted third party; electronic commerce;
D O I
10.1016/j.compeleceng.2006.01.021
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The most efficient approach to a fair exchange is to use an off-line trusted third party (TTP for short) who gets involved only when a dispute between two parties occurs. However, exchanged secrets that are not protected properly may be exposed to the TTP when one of these two parties asks the TTP to mediate the dispute. The first work to protect exchanged secrets from TTP's misuse was proposed by Franklin and Reiter in 1997. They provided an on-line semi-trusted third party instead of an off-line third party for a fair exchange. Their schemes forced the TTP to take part in the protocol for all the cases, and thus, deemed to be impractical. The present paper, introduces several models, including single and multiple TTPs, to focus the attention not only on security properties, but also on reliability functions. In the single TTP mode, our new scheme can protect the exchanged data through an efficient exchange protocol, whereas in the multiple TTP mode, we proposed an approach to balance the security level with the reliability of the system. (c) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:364 / 375
页数:12
相关论文
共 50 条
  • [41] An Off-line Mobile Payment Protocol Providing Double-spending Detection
    Tso, Raylin
    Lin, Chen-Yi
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 570 - 575
  • [42] Adaptive off-line protocol for prostate external radiotherapy with cone beam computer tomography
    Piziorska, M.
    Kukolowicz, P.
    Zawadzka, A.
    Pilichowska, M.
    Peczkowski, P.
    STRAHLENTHERAPIE UND ONKOLOGIE, 2012, 188 (11) : 1003 - 1009
  • [43] Off-line password guessing attack on an efficient key agreement protocol for secure authentication
    Department of Computer Science and Engineering, Shanghai Jiao Tong University, No. 1954, Huashan Road, Shanghai 200030, China
    Int. J. Netw. Secur., 2006, 1 (35-38):
  • [44] Off-Line Dictionary Attack on Password-Based Authenticated Key Exchange Protocols
    XU Chungen1
    2.Zijin College
    Wuhan University Journal of Natural Sciences, 2012, 17 (06) : 468 - 472
  • [45] An Efficient ID-based Fair Off-line Electronic Cash Scheme without Bilinear Pairings
    Cui, Wei
    Song, Xuepeng
    Jia, Qian
    2019 4TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (ICBDA 2019), 2019, : 286 - 290
  • [46] How to construct efficient on-line/off-line threshold signature schemes through the simulation approach
    Gao, Chong-zhi
    Wei, Baodian
    Xie, Dongqing
    Tang, Chunming
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2009, 21 (10): : 1351 - 1372
  • [47] ONLINE ALGORITHMS VERSUS OFF-LINE ALGORITHMS - HOW MUCH IS IT WORTH TO KNOW THE FUTURE
    KARP, RM
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 12 : 416 - 421
  • [48] ONLINE ALGORITHMS VERSUS OFF-LINE ALGORITHMS - HOW MUCH IS IT WORTH TO KNOW THE FUTURE
    KARP, RM
    MATHEMATICAL SOCIAL SCIENCES, 1993, 25 (03) : 307 - 307
  • [49] Off-line password-guessing attacks on the generalized key agreement and password authentication protocol
    Shim, K
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 511 - 515
  • [50] IMPACT OF AN OFF-LINE CORRECTION PROTOCOL ON SETUP UNCERTAINTY IN MODERN BREAST CANCER RADIATION THERAPY
    Josipovic, M.
    Korreman, S.
    Zacharatou, C.
    RADIOTHERAPY AND ONCOLOGY, 2009, 92 : S173 - S173