Abstract
We present specifications and provably-secure protocol, for fully automated resolution of disputes between a provider of digital goods and services, and its customers. Disputes may involve the timely receipt of orders and goods, due to communication failures and malicious faults, as well as disputes on the fitness of the goods to the order. Our design is a part of a layered architecture for secure e-commerce applications [1], with precise yet general-purpose interfaces, agreements and validation functions (e.g. automatically resolving disputes on quality or fitness of goods). The modular design of the protocol and specifications, allows usage as an underlying service to different e-commerce, e-banking and other distributed systems. Our protocol operates efficiently, reliably and securely under realistic failure and delay conditions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Herzberg, A., Yoffe, I.: Layered Architecture for Secure E-Commerce Applications. In: SECRYPT 2006 - International Conference on Security and Cryptography. INSTICC Press (to appear, 2006)
Rivest, R., Shamir, A.: PayWord and MicroMint: Two Simple Micropayment Schemes. In: Proceedings of the International Workshop on Security Protocols, pp. 69–87 (1996)
Micali, S., Rivest, R.: Micropayments revisited. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, p. 149. Springer, Heidelberg (2002)
Herzberg, A.: Micropayments. In: Payment technologies for E-commerce, Ch. 13. Springer, Heidelberg (2003)
Chaum, D.: Blind Signatures for Untraceable Payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology - Proceedings of CRYPTO 1982, pp. 199–203. Plenum, New York (1983)
Bellare, M., Garay, J., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Herrenweghen, E.V., Waidner, M.: Design, Implementation and Deployment of the iKP Secure Electronic Payment System. Journal on Selected Areas in Communication, special issue on Network Security 18, 611–627 (2000)
Cox, B., Tygar, J.D., Sirbu, M.: NetBill security and Transaction Protocol. In: The First USENIX Workshop on Electronic Commerce, pp. 77–88 (1995)
Lacoste, G., Pfitzmann, B., Steiner, M., Waidner, M. (eds.): SEMPER 2000. LNCS, vol. 1854. Springer, Heidelberg (2000)
Nenadic, A., Zhang, N.: Non-repudiation and Fairness in Electronic Data Exchange. In: Proceedings of 5th International Conference on Enterprise Information Systems (ICEIS), Angers, France, pp. 55–62 (2003)
Pfitzmann, B., Schunter, M., Waidner, M.: Provably Secure Certified Mail. In IBM Research Report RZ 3207 (#93253), IBM Research Division, Zurich (2000)
Ray, I., Ray, I.: Fair exchange in E-commerce. SIGecom Exch. 3(2), 9–17 (2002)
Kremer, S., Markowitch, O.: Fair Multi-Party Non-Repudiation Protocols. International Journal on Information Security 1(4), 223–235 (2003)
Zhou, J., Deng, R.H., Bao, F.: Evolution of Fair Non-repudiation with TTP. In: Pieprzyk, J.P., Safavi-Naini, R., Seberry, J. (eds.) ACISP 1999. LNCS, vol. 1587, pp. 258–269. Springer, Heidelberg (1999)
Kremer, S., Markowitch, O., Zhou, J.: An Intensive Survey of Non-repudiation Protocols. Computer Communications 25(17), 1606–1621 (2002)
Herzberg, A.: The Layered Adversarial Specifications Framework (in progress) (2006)
Herzberg, A.: Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer. Cryptology ePrint Archive, Report 2002/084 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Herzberg, A., Yoffe, I. (2006). On Secure Orders in the Presence of Faults. In: De Prisco, R., Yung, M. (eds) Security and Cryptography for Networks. SCN 2006. Lecture Notes in Computer Science, vol 4116. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11832072_9
Download citation
DOI: https://doi.org/10.1007/11832072_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38080-1
Online ISBN: 978-3-540-38081-8
eBook Packages: Computer ScienceComputer Science (R0)