Proceedings of the Twenty-Second Annual Symposium on Principles of Distributed Computing 2003
DOI: 10.1145/872035.872060
|View full text |Cite
|
Sign up to set email alerts
|

Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures

Abstract: Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allows two parties to exchange items in a fair way so that either each party gets the other's item, or neither party does. We describe a novel method of constructing very efficient fair-exchange protocols by distributing the computation of RSA signatures. Specifically, we employ multisignatures based on the RSA-signature scheme. To date, t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
106
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 103 publications
(106 citation statements)
references
References 32 publications
0
106
0
Order By: Relevance
“…that d=d1+d2 mod Φ (n), by following park et aldid in [18].The signature of this user has to be exchanged with the other and this signature is…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…that d=d1+d2 mod Φ (n), by following park et aldid in [18].The signature of this user has to be exchanged with the other and this signature is…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…Actually, fair exchange includes the following different but related issues: contract signing protocols [20,12,16,6,2,4,23,33,7], certified e-mail systems [39,30,5,28,1], non-repudiation protocols [38,31,27], and epayment schemes in electronic commerce [15,34]. For more references and discussions on the relationships between those conceptions, please refer to [3,31].…”
Section: Related Workmentioning
confidence: 99%
“…Compared with the schemes belonging to previous two types, contract signing protocols with off-line TTP [2,3,4,6,34] are more appealing and practical for most applications. Because those protocols are optimistic in the sense that the TTP is not invoked in the execution of exchange unless one of the two parties misbehaves or the communication channel is out of order.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, the CS scheme proposed by Boyd and Foo is to split multiplicatively the secret key of a standard RSA signature. Recently, Park et al [22] propose a CS scheme which splits the key additively, and based on that, present a very efficient protocol in which the partial signature is non-interactively verifiable. But unfortunately, Dodis and Reyzin [10] break the scheme by proving the TTP can obtain Alice's entire secret key with only her registration information.…”
Section: Related Workmentioning
confidence: 99%