Affiliation:
1. University of Memphis, USA
2. University of Tennessee at Chattanooga, USA
Abstract
Fair exchange between parties can be defined as an instance of exchange such that either all parties involved in the exchange obtain what they expected or neither one does. The authors examine a protocol by Micali that provides fair contract signing, where two parties exchange their commitments over a pre-negotiated contract in a fair manner. They show that Micali’s protocol is not entirely fair and demonstrate the possibilities for one party cheating the other by obtaining the other party’s commitment and not offering theirs. A revised version of this protocol by Bao which provides superior fairness by handling some of the weaknesses is also discussed. However, both these protocols fail to handle the possibilities of a replay attack. Their prior work improves upon these protocols by addressing the weakness that leads to a replay attack. This journal extends their prior work on fair electronic exchange by handling a type of attack which was not handled earlier and provides a brief survey of the recent work related to the field of fair electronic exchange. They also discuss the application of cryptography to our protocol which includes implementation of hybrid cryptography and digital signature algorithms based on elliptic curves to achieve features like confidentiality, data-integrity and non-repudiation.
Reference46 articles.
1. ANSI X9. 63. (1999). Elliptic Curve Key Agreement and Key Transport Protocols. Washington, DC: American Bankers Association.
2. Asokan, N., Schunter, M., & Waidner, M. (1997). Optimistic protocols for fair exchange. In T. Matsumoto (Ed.), 4th ACM Conference on Computer and Communications Security. (pp. 6, 8–17). Zurich, Switzerland: ACM Press.
3. Optimistic fair exchange of digital signatures.;N.Asokan;Advances in Cryptology-EUROCRYP,1998
4. Optimistic fair exchange of digital signatures
5. Ateniese, G. (1999). Efficient verifiable encryption (and fair exchange) of digital signatures. Proceedings of the 6th ACM conference on Computer and communications security (pp. 138-146). ACM.