On Secure Orders in the Presence of Faults

  • Amir Herzberg
  • Igal Yoffe
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4116)


We present specifications and provably-secure protocol, for fully automated resolution of disputes between a provider of digital goods and services, and its customers. Disputes may involve the timely receipt of orders and goods, due to communication failures and malicious faults, as well as disputes on the fitness of the goods to the order. Our design is a part of a layered architecture for secure e-commerce applications [1], with precise yet general-purpose interfaces, agreements and validation functions (e.g. automatically resolving disputes on quality or fitness of goods). The modular design of the protocol and specifications, allows usage as an underlying service to different e-commerce, e-banking and other distributed systems. Our protocol operates efficiently, reliably and securely under realistic failure and delay conditions.


Signature Scheme Fair Exchange Honest Party Order Channel Random Tape 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Herzberg, A., Yoffe, I.: Layered Architecture for Secure E-Commerce Applications. In: SECRYPT 2006 - International Conference on Security and Cryptography. INSTICC Press (to appear, 2006)Google Scholar
  2. 2.
    Rivest, R., Shamir, A.: PayWord and MicroMint: Two Simple Micropayment Schemes. In: Proceedings of the International Workshop on Security Protocols, pp. 69–87 (1996)Google Scholar
  3. 3.
    Micali, S., Rivest, R.: Micropayments revisited. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, p. 149. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Herzberg, A.: Micropayments. In: Payment technologies for E-commerce, Ch. 13. Springer, Heidelberg (2003)Google Scholar
  5. 5.
    Chaum, D.: Blind Signatures for Untraceable Payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology - Proceedings of CRYPTO 1982, pp. 199–203. Plenum, New York (1983)Google Scholar
  6. 6.
    Bellare, M., Garay, J., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Herrenweghen, E.V., Waidner, M.: Design, Implementation and Deployment of the iKP Secure Electronic Payment System. Journal on Selected Areas in Communication, special issue on Network Security 18, 611–627 (2000)Google Scholar
  7. 7.
    Cox, B., Tygar, J.D., Sirbu, M.: NetBill security and Transaction Protocol. In: The First USENIX Workshop on Electronic Commerce, pp. 77–88 (1995)Google Scholar
  8. 8.
    Lacoste, G., Pfitzmann, B., Steiner, M., Waidner, M. (eds.): SEMPER 2000. LNCS, vol. 1854. Springer, Heidelberg (2000)Google Scholar
  9. 9.
    Nenadic, A., Zhang, N.: Non-repudiation and Fairness in Electronic Data Exchange. In: Proceedings of 5th International Conference on Enterprise Information Systems (ICEIS), Angers, France, pp. 55–62 (2003)Google Scholar
  10. 10.
    Pfitzmann, B., Schunter, M., Waidner, M.: Provably Secure Certified Mail. In IBM Research Report RZ 3207 (#93253), IBM Research Division, Zurich (2000)Google Scholar
  11. 11.
    Ray, I., Ray, I.: Fair exchange in E-commerce. SIGecom Exch. 3(2), 9–17 (2002)CrossRefGoogle Scholar
  12. 12.
    Kremer, S., Markowitch, O.: Fair Multi-Party Non-Repudiation Protocols. International Journal on Information Security 1(4), 223–235 (2003)CrossRefGoogle Scholar
  13. 13.
    Zhou, J., Deng, R.H., Bao, F.: Evolution of Fair Non-repudiation with TTP. In: Pieprzyk, J.P., Safavi-Naini, R., Seberry, J. (eds.) ACISP 1999. LNCS, vol. 1587, pp. 258–269. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  14. 14.
    Kremer, S., Markowitch, O., Zhou, J.: An Intensive Survey of Non-repudiation Protocols. Computer Communications 25(17), 1606–1621 (2002)CrossRefGoogle Scholar
  15. 15.
    Herzberg, A.: The Layered Adversarial Specifications Framework (in progress) (2006)Google Scholar
  16. 16.
    Herzberg, A.: Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer. Cryptology ePrint Archive, Report 2002/084 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Amir Herzberg
    • 1
  • Igal Yoffe
    • 1
  1. 1.Computer Science DepartmentBar Ilan UniversityRamat GanIsrael

Personalised recommendations