首页 | 本学科首页   官方微博 | 高级检索  
     


How to protect exchanged secrets in the fair exchange protocol with off-line TTP
Authors:Chih-Hung Wang [Author Vitae]  Chih-Heng Yin [Author Vitae] [Author Vitae]
Affiliation:a Department of Computer Science and Information Engineering, National Chiayi University, Chiayi, Taiwan, ROC
b Department of Information Management, I-Shou University, Kaohsiung, Taiwan, ROC
Abstract:The most efficient approach to a fair exchange is to use an off-line trusted third party (TTP for short) who gets involved only when a dispute between two parties occurs. However, exchanged secrets that are not protected properly may be exposed to the TTP when one of these two parties asks the TTP to mediate the dispute. The first work to protect exchanged secrets from TTP’s misuse was proposed by Franklin and Reiter in 1997. They provided an on-line semi-trusted third party instead of an off-line third party for a fair exchange. Their schemes forced the TTP to take part in the protocol for all the cases, and thus, deemed to be impractical.The present paper, introduces several models, including single and multiple TTPs, to focus the attention not only on security properties, but also on reliability functions. In the single TTP mode, our new scheme can protect the exchanged data through an efficient exchange protocol, whereas in the multiple TTP mode, we proposed an approach to balance the security level with the reliability of the system.
Keywords:Cryptography   Network security   Fair exchange   Semi-trusted third party   Electronic commerce
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号