File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TIFS.2014.2326294
- Scopus: eid_2-s2.0-84904354450
- WOS: WOS:000340194400002
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Collusion-resistance in optimistic fair exchange
Title | Collusion-resistance in optimistic fair exchange |
---|---|
Authors | |
Keywords | Optimistic fair exchange enhanced model collusion |
Issue Date | 2014 |
Citation | IEEE Transactions on Information Forensics and Security, 2014, v. 9, n. 8, p. 1227-1239 How to Cite? |
Abstract | Optimistic fair exchange (OFE) is a type of cryptographic protocols aimed at solving the fair exchange problem over open networks with the help of a third party to settle disputes between exchanging parties. It is well known that a third party is necessary in the realization of a fair exchange protocol. However, a fully trusted third party may not be available over open networks. In this paper, the security of most of the proposed OFE protocols depends on the assumption that the third party is semitrusted in the sense that it may misbehave on its own but does not conspire with either of the main parties. The existing security models of OFE have not taken into account the case where the potentially dishonest third party may collude with a signer in the sense of sharing its secret key with the signer. In this paper, to reduce the trust level of the arbitrator and increase the security of OFE, we propose an enhanced security model that, for the first time, captures this scenario. We also show a separation between the existing model and our enhanced model with a concrete counter example. Finally, we revisit two popular approaches in the construction of OFE protocols, which are based on verifiably encrypted signature and conventional signature plus ring signature, respectively. Our result shows that the conventional signature plus ring signature approach approach remains valid in our enhanced model. However, for schemes based on verifiably encrypted signature, slight modifications are needed to guarantee the security. © 2005-2012 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/280482 |
ISSN | 2023 Impact Factor: 6.3 2023 SCImago Journal Rankings: 2.890 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, Yang | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Wang, Guilin | - |
dc.date.accessioned | 2020-02-17T14:34:08Z | - |
dc.date.available | 2020-02-17T14:34:08Z | - |
dc.date.issued | 2014 | - |
dc.identifier.citation | IEEE Transactions on Information Forensics and Security, 2014, v. 9, n. 8, p. 1227-1239 | - |
dc.identifier.issn | 1556-6013 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280482 | - |
dc.description.abstract | Optimistic fair exchange (OFE) is a type of cryptographic protocols aimed at solving the fair exchange problem over open networks with the help of a third party to settle disputes between exchanging parties. It is well known that a third party is necessary in the realization of a fair exchange protocol. However, a fully trusted third party may not be available over open networks. In this paper, the security of most of the proposed OFE protocols depends on the assumption that the third party is semitrusted in the sense that it may misbehave on its own but does not conspire with either of the main parties. The existing security models of OFE have not taken into account the case where the potentially dishonest third party may collude with a signer in the sense of sharing its secret key with the signer. In this paper, to reduce the trust level of the arbitrator and increase the security of OFE, we propose an enhanced security model that, for the first time, captures this scenario. We also show a separation between the existing model and our enhanced model with a concrete counter example. Finally, we revisit two popular approaches in the construction of OFE protocols, which are based on verifiably encrypted signature and conventional signature plus ring signature, respectively. Our result shows that the conventional signature plus ring signature approach approach remains valid in our enhanced model. However, for schemes based on verifiably encrypted signature, slight modifications are needed to guarantee the security. © 2005-2012 IEEE. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Transactions on Information Forensics and Security | - |
dc.subject | Optimistic fair exchange | - |
dc.subject | enhanced model | - |
dc.subject | collusion | - |
dc.title | Collusion-resistance in optimistic fair exchange | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/TIFS.2014.2326294 | - |
dc.identifier.scopus | eid_2-s2.0-84904354450 | - |
dc.identifier.volume | 9 | - |
dc.identifier.issue | 8 | - |
dc.identifier.spage | 1227 | - |
dc.identifier.epage | 1239 | - |
dc.identifier.isi | WOS:000340194400002 | - |
dc.identifier.issnl | 1556-6013 | - |