2010
DOI: 10.1109/tifs.2009.2035972
|View full text |Cite
|
Sign up to set email alerts
|

An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature

Abstract: A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a fair way, so that either each of them obtains the other's signature, or neither party does. Based on the RSA signature scheme, a new digital contract signing protocol is proposed in this paper. Like the existing RSA-based solutions for the same problem, our protocol is not only fair, but also optimistic, since the third trusted party i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(3 citation statements)
references
References 45 publications
0
1
0
Order By: Relevance
“…Some authors [19,[21][22][23][24][25][26][27][28][29][30][31] used definitions that fit the definition we have called hard-timeliness. While other authors [8,9,13,15,[32][33][34][35][36][37][38][39][40][41][42][43][44][45] used definitions that fit the definition we have called soft-timeliness. Some introduced nuance: predetermined time [34,37], agreed time [35,36], bounded time [39], or that the protocol defines a deadline [45].…”
Section: Timelinessmentioning
confidence: 99%
See 1 more Smart Citation
“…Some authors [19,[21][22][23][24][25][26][27][28][29][30][31] used definitions that fit the definition we have called hard-timeliness. While other authors [8,9,13,15,[32][33][34][35][36][37][38][39][40][41][42][43][44][45] used definitions that fit the definition we have called soft-timeliness. Some introduced nuance: predetermined time [34,37], agreed time [35,36], bounded time [39], or that the protocol defines a deadline [45].…”
Section: Timelinessmentioning
confidence: 99%
“…While other authors [8,9,13,15,[32][33][34][35][36][37][38][39][40][41][42][43][44][45] used definitions that fit the definition we have called soft-timeliness. Some introduced nuance: predetermined time [34,37], agreed time [35,36], bounded time [39], or that the protocol defines a deadline [45]. Finally, some authors [46][47][48] presented both types of definition.…”
Section: Timelinessmentioning
confidence: 99%
“…Furthermore, the RC4 stream cipher proposed in [27] can also provide a good confidentiality protection in data encryption. In addition, the asymmetric-key cryptographic algorithm, such as the Rivest-Shamir-Adleman (RSA), which is a high-quality public key cryptographic algorithm, is suitable for digital signature, key exchange, etc., in a large set of security protocols instead of data encryption [28], because it is so expensive compared to the symmetric cryptography in data-intensive computing tasks.…”
Section: Confidentiality Protection Schemementioning
confidence: 99%