Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186)
DOI: 10.1109/secpri.1998.674826
|View full text |Cite
|
Sign up to set email alerts
|

Asynchronous protocols for optimistic fair exchange

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
194
0
2

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 206 publications
(197 citation statements)
references
References 7 publications
1
194
0
2
Order By: Relevance
“…Accountability and verifiability are properties relevant for protocols involving trusted parties, e.g., voting [KRS10], auctions [PRST08], contract signing [ASW98], identity-based encryption etc. In [KTV10a], a formal definition of accountability is given that is independent of the specific application.…”
Section: Accountability and Verifiabilitymentioning
confidence: 99%
“…Accountability and verifiability are properties relevant for protocols involving trusted parties, e.g., voting [KRS10], auctions [PRST08], contract signing [ASW98], identity-based encryption etc. In [KTV10a], a formal definition of accountability is given that is independent of the specific application.…”
Section: Accountability and Verifiabilitymentioning
confidence: 99%
“…The ASW protocol is an optimistic fair-exchange protocol for contract signing, proposed by Asokan, Shoup and Waidner in [ASW98]. Figure 1 shows the slightly simplified version of the Exchange Subprotocol of ASW (that we will simply refer afterwards as the ASW protocol) that Caleiro, Viganò and Basin have used in [CVB06] to illustrate that a direct interpretation of protocol narrations would be too naive.…”
Section: The Protocolmentioning
confidence: 99%
“…Another approach focuses on increasing the overall efficiency by using T T P s. Notable works in this direction are the three-message off-line protocol for certified e-mail presented in [18] and the efficient off-line fair exchange protocols in [1,2,7]. The protocol in [1] makes use of verifiable escrow schemes implemented via a cut and choose interactive proof.…”
Section: Related Workmentioning
confidence: 99%
“…Some of the off-line protocols are not monotonic, for instance, the protocol in [2] requires signatures to be revoked in order to guarantee fairness. Among monotonic and off-line protocols, we believe those in [18,1] represent the state-of-the-art in the field.…”
Section: Analysis and Comparisonsmentioning
confidence: 99%