Advertisement

An Optimistic Fair Exchange Protocol for Trading Electronic Rights

  • Masayuki Terada
  • Makoto Iguchi
  • Masayuki Hanadate
  • Ko Fujimura
Conference paper
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 153)

Abstract

Reliable electronic commerce systems must offer fairness. In this paper, we propose a fair exchange protocol for trading electronic vouchers, which are the representation of rights to claim goods or services. This protocol enables two players to exchange vouchers stored in their smartcards fairly and efficiently. The players can exchange vouchers through a 4-round mutual communication protocol between their smartcards as long as the protocol is performed properly. If the protocol becomes unable to proceed due to misbehavior of the partner or for any other reason, the player that has fallen into the unfair condition (i.e. the player who sent its voucher but didn’t receive the desired voucher) can recover fairness by performing a recovery protocol with a trusted third-party. Since the recovery protocol doesn’t need the cooperation of the partner, fairness can be recovered without identifying or tracking the partner; one can trade vouchers securely even if the trading partner cannot be identified.

Keywords

Trading Partner Replay Attack Fair Exchange Recovery Protocol Trading Electronic 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [1]
    N. Asokan. Fairness in Electronic Commerce. PhD thesis, University of Waterloo, 1998.Google Scholar
  2. [2]
    N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 86–99. IEEE Computer Society Press, May 1998.Google Scholar
  3. [3]
    N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications, 18(4):593–610, Apr. 2000.CrossRefGoogle Scholar
  4. [4]
    C. Ellison and B. Schneier. Ten risks of PKI: What you’re not being told about public key infrastructure. Computer Security Journal, 16(1): 1–7, 2000.Google Scholar
  5. [5]
    K. Fujimura and D. Eastlake. RFC 3506: Requirements and Design for Voucher Trading System (VTS), Mar. 2003.Google Scholar
  6. [6]
    K. Fujimura and M. Terada. Trading among untrusted partners via voucher trading system. In Proceedings of the 1st Conf. on e-Commerce, e-Business, e-Government. IFIP, Oct. 2001.Google Scholar
  7. [7]
    M. Iguchi, M. Terada, Y. Nakamura, and K. Fujimura. Voucher-integrated trading model for C2B and C2C e-commerce system development. In Proceedings of the 2nd Conf. on e-Commerce, e-Business, e-Government. IFIP, Oct. 2002.Google Scholar
  8. [8]
    S. Kremer, O. Markowitch, and J. Zhou. An intensive survey of fair non-repudiation protocols. Computer Communications, 25(17):1606–1621, Nov. 2002.CrossRefGoogle Scholar
  9. [9]
    G. Lacoste, B. Pfitzmann, M. Steiner, and M. Waidner, editors. SEMPER — Secure Electronic Marketplace for Europe, volume 1854 of LNCS. Springer-Verlag, New York, NY, USA, 2000.Google Scholar
  10. [10]
    NIST. F1PS 180-1: Secure Hash Standard, Apr. 1995.Google Scholar
  11. [11]
    H. Pagnia, H. Vogt, and F. C. Gärtner. Fair exchange. The Computer Journal, 46(1): 55–75, Jan. 2003.CrossRefGoogle Scholar
  12. [12]
    M. Schunter. Optimistic Fair Exchange. PhD thesis, Universität des Saarlandes, 2000.Google Scholar
  13. [13]
    V. Shmatikov and J. C. Mitchell. Analysis of a fair exchange protocol. In Proceedings of the 1999 FLoC Workshop on Formal Methods and Security Protocols, July 1999.Google Scholar
  14. [14]
    M. Terada, H. Kuno, M. Hanadate, and K. Fujimura. Copy prevention scheme for rights trading infrastructure. In Proceedings of the 4th Working Conference on Smart Card Research and Advanced Applications (CARDIS), pages 51–70. IFIP, Sept. 2000.Google Scholar
  15. [15]
    H. Vogt. Asynchronous optimistic fair exchange based on revocable items. In Proceedings of the 7th International Financial Cryptography Conference, pages 208–222. IFCA, Jan. 2003.Google Scholar
  16. [16]
    H. Vogt, H. Pagnia, and F. C. Gärtner. Modular fair exchange protocols for electronic commerce. In Proceedings of the 15th Annual Computer Security Applications Conference, pages 3–11, Dec. 1999.Google Scholar
  17. [17]
    J. Zhou. Achieving fair nonrepudiation in electronic transactions. Journal of Organizational Computing and Electronic Commerce, 11(4):253–267, Dec. 2001.CrossRefGoogle Scholar
  18. [18]
    J. Zhou, R. Deng, and F. Bao. Evolution of fair non-repudiation with TTP. In Proceedings of the 4th Australasian Conference on Information Security and Privacy (ACISP’99), pages 258–269, Apr. 1999.Google Scholar

Copyright information

© Springer Science + Business Media, Inc. 2004

Authors and Affiliations

  • Masayuki Terada
    • 1
  • Makoto Iguchi
    • 2
  • Masayuki Hanadate
    • 2
  • Ko Fujimura
    • 2
  1. 1.Network Management Development Dept.NTT DoCoMoUSA
  2. 2.Information Sharing Platform Labs.NTTUSA

Personalised recommendations