Advertisement

Solving Bao’s Colluding Attack in Wang’s Fair Payment Protocol

  • M. Magdalena Payeras-Capellà
  • Josep L. Ferrer Gomila
  • Llorenç Huguet Rotger
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4277)

Abstract

An electronic purchase is an essential operation of electronic commerce. Fairness in the exchange of money and product, as well as anonymity of the buyer, are desirable features. In Asiacrypt 2003, C.H. Wang [8] presented a purchase protocol satisfying both anonymity and fairness, adapting the anonymous payment system of Brands [2], using a restrictive confirmation signature scheme. Later, In Asiacrypt 2004, Feng Bao [1] demonstrated that Wang’s protocol [8] can be vulnerable to attacks produced by colluding users, and he affirmed that the protocol cannot be corrected due to the anonymity of the protocol. We will show that it is possible to correct Wang’s protocol in order to avoid colluding attacks. We present a solution that modifies slightly the original protocol, maintaining the anonymity and untraceability of the original version. Finally, we discuss the convenience to achieve the property of timeliness.

Keywords

Payment System Dispute Resolution Electronic Commerce Trusted Third Party Digital Product 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bao, F.: Colluding attacks to a payment protocol and two signature exchange schemes. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 417–429. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  2. 2.
    Brands, S.: Untraceable off-line cash in wallet with observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 302–318. Springer, Heidelberg (1994)Google Scholar
  3. 3.
    Camp, J., Harkavy, M., Tygar, J.D., Yee, B.: Anonymous atomic transactions. In: 2nd USENIX workshop on electronic commerce, pp. 123–133 (1996)Google Scholar
  4. 4.
    Jakobsson, M.: Ripping coins for a fair exchange. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 220–230. Springer, Heidelberg (1995)Google Scholar
  5. 5.
    Payeras, M., Ferrer, J., Huguet, L.: Anonymous Payment in a Fair E-commerce Protocol With Verifiable TTP. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol. 3592, pp. 60–69. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Schuldt, H., Popovivi, A., Schek, H.: Execution guarantees in electronic commerce payments. In: Saake, G., Schwarz, K., Türker, C. (eds.) FoMLaDO 1999. LNCS, vol. 1773, Springer, Heidelberg (2000)Google Scholar
  7. 7.
    Tygar, J.D.: Atomicity in electronic commerce. In: 15th annual ACM symposium on principles of distributed computing, pp. 8–26 (1996)Google Scholar
  8. 8.
    Wang, C.H.: Untraceable fair network payment protocol with off-line TTP. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 173–187. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  9. 9.
    Xu, S., Yung, M., Zhang, G., Zhu, H.: Money conservation via atomicity in fair off-line e-cash. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol. 1729, pp. 14–31. Springer, Heidelberg (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • M. Magdalena Payeras-Capellà
    • 1
  • Josep L. Ferrer Gomila
    • 1
  • Llorenç Huguet Rotger
    • 1
  1. 1.Universitat de les Illes BalearsPalma de MallorcaSpain

Personalised recommendations