An Improved E-Commerce Protocol for Fair Exchange

  • Debajyoti Konar
  • Chandan Mazumdar
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4317)


In this paper, an improved fair exchange protocol for e-commerce has been presented. The new protocol builds upon a previously published one by Ray & Ray [12]. After discussing the protocol and related fairness, four weaknesses have been found, viz., Fairness Problem: Advantage Merchant, Fairness Problem: Advantage Customer, Possibility of Man in the Middle Attack and Possibility of Malicious Bank. Our modified fair exchange e-commerce protocol is able to handle these weaknesses. The proposed protocol does not involve third party to ensure the fairness.


Trusted Third Party Third Party Digital Product Modify Protocol Fair Exchange 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Alur, R., Henzinger, T.A., Mang, F.Y.C., Qadeer, S., Rajamani, S.K., Tasiran, S.: Mocha: Modularity in model checking. In: Y. Vardi, M. (ed.) CAV 1998. LNCS, vol. 1427, pp. 521–525. Springer, Heidelberg (1998), CrossRefGoogle Scholar
  2. 2.
    Asokan, N., Schunter, V., Waidner, M.: Optimistic Protocols for Fair Exchange. In: Proc. Of 4th ACM Conference on Computer and Communication Security, Zurich (1997)Google Scholar
  3. 3.
    Asokan, N., Shoup, V., Waidner, M.: Asynchronous Protocols for Optimistic Fair Exchange. In: Proc. IEEE Symposium on Research in Security and Privacy, pp. 86–99 (1998)Google Scholar
  4. 4.
    Bao, F., Wang, G., Zhou, J., Zhu, H.: Analysis and Improvementof Micali’s Fair Cotract Signing Protocol. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 176–187. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  5. 5.
    Even, S., Goldreich, O., Lempel, A.: A Randomized Protocol for Signing Contracts. Communications of the ACM 28(6), 637–647 (1985)CrossRefMathSciNetGoogle Scholar
  6. 6.
    Kemmerer, R., Meadows, C., Millen, J.: Three Systems for Cryptographic Protocol Analysis. J. Cryptography 7(2), 79–130 (1994)MATHGoogle Scholar
  7. 7.
    Kremer, S., Markowitch, O., Zhou, J.: An Intensive Survey of Fair exchange Protocols. J. Computer Communications 25(17), 1606–1621 (2002)CrossRefGoogle Scholar
  8. 8.
    Meadows, C.: The NRL Protocol Analyzer: An Overview. J. Logic Programming 26(2), 113–131 (1996)MATHCrossRefGoogle Scholar
  9. 9.
    Meadows, C.: Analyzing the Needham-Schroeder Public Key Protocol: A Comparison of Two Approaches. In: Proc. European symposium on Research in Computer Security, pp. 365–384. Springer, Heidelberg (1996)Google Scholar
  10. 10.
    Micali, S.: Simple and Fast Optimistic Protocols for Fair Electronic Exchange. In: Proc. ACM Symposium on Principles of Distributed Computing, Boston, USA, pp. 12–19 (2003)Google Scholar
  11. 11.
    Onieva, J., Zhou, J., Lopez, J.: Non-repudiation Protocols for Multiple Entities. J. Computer Communications 27(16), 1608–1616 (2004)CrossRefGoogle Scholar
  12. 12.
    Ray, I., Ray, I.: An Anonymous Fair-Exchange E-Commerce Protocol. In: Proceedings of the First International Workshop on Internet Computing and E-Commerce, April 2001, San Francisco, CA (2001)Google Scholar
  13. 13.
    Schneider, S.: Formal analysis of a Non-repudiation Protocol. In: Proc. 11th IEEE Computer Security Foundations workshop, Rockport, USA, pp. 54–65 (1998)Google Scholar
  14. 14.
    Zhou, J.: Achieving Fair Non-repudiation in Electronic Transactions. J. Organizational Computing and Electronic Commerce 11(4), 253–267 (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Debajyoti Konar
    • 1
  • Chandan Mazumdar
    • 2
  1. 1.Institute of Engg & ManagementKolkataIndia
  2. 2.Jadavpur UniversityKolkataIndia

Personalised recommendations