Electronic Contract Signing Without Using Trusted Third Party
Abstract
Electronic contract signing allows two potentially dis-trustful parties to digitally sign an electronic document “simultaneously” across a network. Existing solutions for electronic contract signing either require the involvement of a trusted third party (TTP), or are complex and expensive in communication and computation. In this paper we propose an electronic contract signing protocol between two parties with the following advantages over existing solutions: 1) it is practical and scalable due to its simplicity and high efficiency; 2) it does not require any trusted third party as the mediator; and 3) it guarantees fairness between the two signing parties. We achieve these properties by employing a trustworthy timestamping service in our protocol, where the timestamping service can be either centralized or decentralized. We also provide a detailed analysis on security and performance of our scheme.
Keywords
Hash Function Trust Third Party Fair Exchange Honest Party Hash ChainPreview
Unable to display preview. Download preview PDF.
References
- 1.Goldreich, O.: A simple protocol for signing contracts. In: Proc. CRYPTO 1983, pp. 133–136. Plenum Press (1983)Google Scholar
- 2.Ben-Or, M., Goldreich, O., Micali, S., Rivest, R.L.: A Fair Protocol for Signing Contracts. IEEE Trans. Inf. Theory 36(1), 40–46 (1990)CrossRefGoogle Scholar
- 3.Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 591–606. Springer, Heidelberg (1998) CrossRefGoogle Scholar
- 4.Ateniese, G.: Efficient verifiable encryption (and Fair Exchange) of digital signature. In: Proc. ACM Conf. CCS 1999, pp. 138–146. ACM Press (1999)Google Scholar
- 5.Bao, F., Deng, R.H., Mao, W.: Efficient and practical fair exchange protocols with off-line TTP. In: Proc. IEEE Symp. Security and Privacy, pp. 77–85 (1998)Google Scholar
- 6.Kim, T., Huang, L.-S., Perrig, A., Jackson, C., Gligor, V.: Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure. In: Proc. of the International World Wide Web Conference (WWW) (2013)Google Scholar
- 7.Haber, S., Stornetta, W.S.: How to Time-stamp a Digital Document. Journal of Cryptology 3(2), 99–111 (1991)CrossRefGoogle Scholar
- 8.Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. http://bitcoin.org/bitcoin.pdf (2008)