2008
DOI: 10.1016/j.ic.2007.07.007
|View full text |Cite
|
Sign up to set email alerts
|

Fair multi-party contract signing using private contract signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
54
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(58 citation statements)
references
References 6 publications
1
54
0
Order By: Relevance
“…Because of its inefficiency, Baum-Waidner and Waidner [10] suggested a more efficient protocol, whose complexity depends on the number of dishonest parties, and if the number of dishonest parties is n − 1, its efficiency is the same as [27]. Mukhamedov and Ryan [44] decreased the round complexity to O(n). Lastly, Mauw et al [42] gave the lower bound of O(n 2 ) for the number of messages to achieve fairness.…”
Section: Related Workmentioning
confidence: 99%
“…Because of its inefficiency, Baum-Waidner and Waidner [10] suggested a more efficient protocol, whose complexity depends on the number of dishonest parties, and if the number of dishonest parties is n − 1, its efficiency is the same as [27]. Mukhamedov and Ryan [44] decreased the round complexity to O(n). Lastly, Mauw et al [42] gave the lower bound of O(n 2 ) for the number of messages to achieve fairness.…”
Section: Related Workmentioning
confidence: 99%
“…T performs a deterministic decision procedure, shown in Algorithm 1, on the received message and existing stored messages and immediately sends back "abort" or the list of signatures (S P (C)) P ∈A . Our decision procedure is based on [10,17]. The input to the algorithm consists of a message m received by the T from a signer and state information which is maintained by T. T extracts the contract and the DAG MPCS protocol specification from m. For each contract C, T maintains the following state information.…”
Section: Resolve Protocolmentioning
confidence: 99%
“…It is difficult to ascertain whether or not a cryptographic protocol satisfies its security requirements. Numerous protocols have appeared in literature and have subsequently been found to be flawed [13,14,5]. Typically, cryptographic protocols are expected to achieve their objectives in the presence of an attacker that is assumed to have full control of the network (sometimes called the Dolev-Yao attacker).…”
Section: Introductionmentioning
confidence: 99%