File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Collusion-resistance in optimistic fair exchange

TitleCollusion-resistance in optimistic fair exchange
Authors
KeywordsOptimistic fair exchange
enhanced model
collusion
Issue Date2014
Citation
IEEE Transactions on Information Forensics and Security, 2014, v. 9, n. 8, p. 1227-1239 How to Cite?
AbstractOptimistic fair exchange (OFE) is a type of cryptographic protocols aimed at solving the fair exchange problem over open networks with the help of a third party to settle disputes between exchanging parties. It is well known that a third party is necessary in the realization of a fair exchange protocol. However, a fully trusted third party may not be available over open networks. In this paper, the security of most of the proposed OFE protocols depends on the assumption that the third party is semitrusted in the sense that it may misbehave on its own but does not conspire with either of the main parties. The existing security models of OFE have not taken into account the case where the potentially dishonest third party may collude with a signer in the sense of sharing its secret key with the signer. In this paper, to reduce the trust level of the arbitrator and increase the security of OFE, we propose an enhanced security model that, for the first time, captures this scenario. We also show a separation between the existing model and our enhanced model with a concrete counter example. Finally, we revisit two popular approaches in the construction of OFE protocols, which are based on verifiably encrypted signature and conventional signature plus ring signature, respectively. Our result shows that the conventional signature plus ring signature approach approach remains valid in our enhanced model. However, for schemes based on verifiably encrypted signature, slight modifications are needed to guarantee the security. © 2005-2012 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/280482
ISSN
2023 Impact Factor: 6.3
2023 SCImago Journal Rankings: 2.890
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorWang, Yang-
dc.contributor.authorSusilo, Willy-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorWang, Guilin-
dc.date.accessioned2020-02-17T14:34:08Z-
dc.date.available2020-02-17T14:34:08Z-
dc.date.issued2014-
dc.identifier.citationIEEE Transactions on Information Forensics and Security, 2014, v. 9, n. 8, p. 1227-1239-
dc.identifier.issn1556-6013-
dc.identifier.urihttp://hdl.handle.net/10722/280482-
dc.description.abstractOptimistic fair exchange (OFE) is a type of cryptographic protocols aimed at solving the fair exchange problem over open networks with the help of a third party to settle disputes between exchanging parties. It is well known that a third party is necessary in the realization of a fair exchange protocol. However, a fully trusted third party may not be available over open networks. In this paper, the security of most of the proposed OFE protocols depends on the assumption that the third party is semitrusted in the sense that it may misbehave on its own but does not conspire with either of the main parties. The existing security models of OFE have not taken into account the case where the potentially dishonest third party may collude with a signer in the sense of sharing its secret key with the signer. In this paper, to reduce the trust level of the arbitrator and increase the security of OFE, we propose an enhanced security model that, for the first time, captures this scenario. We also show a separation between the existing model and our enhanced model with a concrete counter example. Finally, we revisit two popular approaches in the construction of OFE protocols, which are based on verifiably encrypted signature and conventional signature plus ring signature, respectively. Our result shows that the conventional signature plus ring signature approach approach remains valid in our enhanced model. However, for schemes based on verifiably encrypted signature, slight modifications are needed to guarantee the security. © 2005-2012 IEEE.-
dc.languageeng-
dc.relation.ispartofIEEE Transactions on Information Forensics and Security-
dc.subjectOptimistic fair exchange-
dc.subjectenhanced model-
dc.subjectcollusion-
dc.titleCollusion-resistance in optimistic fair exchange-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TIFS.2014.2326294-
dc.identifier.scopuseid_2-s2.0-84904354450-
dc.identifier.volume9-
dc.identifier.issue8-
dc.identifier.spage1227-
dc.identifier.epage1239-
dc.identifier.isiWOS:000340194400002-
dc.identifier.issnl1556-6013-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats