Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks

  • Zinaida Benenson
  • Felix C. Freiling
  • Birgit Pfitzmann
  • Christian Rohner
  • Michael Waidner
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4357)


We introduce verifiable agreement as a fundamental service for securing mobile peer-to-peer ad hoc networks, and investigate its solvability. Verifiability of a protocol result means that the participants can prove that the protocol reached a particular result to any third party (the verifier) which was not present in the network at the time of the protocol execution.


Consensus Problem Validity Function Contract Signing Honest Party Byzantine Agreement 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Aboudagga, N., Refaei, M.T., Eltoweissy, M., DaSilva, L.A., Quisquater, J.-J.: Authentication protocols for ad hoc networks: taxonomy and research issues. In: Q2SWinet 2005: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pp. 96–104. ACM Press, New York (2005)CrossRefGoogle Scholar
  2. 2.
    Asokan, N., Baum-Waidner, B., Schunter, M., Waidner, M.: Optimistic synchronous multi-party contract signing. Technical Report Research Report RZ 3089, IBM Zurich Research Laboratory (1998)Google Scholar
  3. 3.
    Asokan, N., Ginzboorg, P.: Key-agreement in ad-hoc networks. Computer Communications 23(17), 1627–1637 (2000)CrossRefGoogle Scholar
  4. 4.
    Augot, D., Bhaskar, R., Issarny, V., Sacchetti, D.: An efficient group key agreement protocol for ad hoc networks. In: First International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing (2005)Google Scholar
  5. 5.
    Baum-Waidner, B., Waidner, M.: Round-optimal and abuse-free multi-party contract signing. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol. 1853, Springer, Heidelberg (2000)CrossRefGoogle Scholar
  6. 6.
    Ben-Or, M., Goldreich, O., Micali, S., Rivest, R.L.: A fair protocol for signing contracts. IEEE Transactions on Information Theory 36(1) (1990)Google Scholar
  7. 7.
    Blum, M.: Three applications of the oblivious transfer. Technical report, Department of EECS, University of California, Berkeley, CA (1981)Google Scholar
  8. 8.
    Bracha, G., Toueg, S.: Asynchronous consensus and broadcast protocols. J. ACM 32(4) (1985)Google Scholar
  9. 9.
    Fischer, M.J.: The consensus problem in unreliable distributed systems (a brief survey). In: Proceedings of the 1983 International FCT-Conference on Fundamentals of Computation Theory, London, UK, pp. 127–140. Springer, Heidelberg (1983)Google Scholar
  10. 10.
    Fitzi, M., Garay, J.A.: Efficient player-optimal protocols for strong and differential consensus. In: PODC 2003: Proceedings of the twenty-second annual symposium on Principles of distributed computing, pp. 211–220. ACM Press, New York (2003)CrossRefGoogle Scholar
  11. 11.
    Garay, J.A., MacKenzie, P.D.: Abuse-free multi-party contract signing. In: Proceedings of the 13th International Symposium on Distributed Computing, London, UK, pp. 151–165. Springer, Heidelberg (1999)Google Scholar
  12. 12.
    Goldwasser, S.: Multi party computations: past and present. In: PODC 1997: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing, pp. 1–6. ACM Press, New York (1997)CrossRefGoogle Scholar
  13. 13.
    Hirt, M., Maurer, U.: Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract). In: PODC 1997: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing, pp. 25–34. ACM Press, New York (1997)CrossRefGoogle Scholar
  14. 14.
    Hubaux, J.-P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: MobiHoc 2001: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pp. 146–155. ACM Press, New York (2001)CrossRefGoogle Scholar
  15. 15.
    Kursawe, K.: Distributed Trust. PhD thesis, Department of Computer Science, Saarland University (2001)Google Scholar
  16. 16.
    Lamport, L.: The weak byzantine generals problem. J. ACM 30(3), 668–676 (1983)MATHCrossRefMathSciNetGoogle Scholar
  17. 17.
    Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)MATHCrossRefGoogle Scholar
  18. 18.
    Liu, J., Sacchetti, D., Sailhan, F., Issarny, V.: Group management for mobile ad hoc networks: design, implementation and experiment. In: MDM 2005: Proceedings of the 6th international conference on Mobile data management, pp. 192–199. ACM Press, New York (2005)CrossRefGoogle Scholar
  19. 19.
    Luo, J., Eugster, P.T., Hubaux, J.-P.: Pilot: Probabilistic lightweight group communication system for ad hoc networks. IEEE Transactions on Mobile Computing 3(2), 164–179 (2004)CrossRefGoogle Scholar
  20. 20.
    Pease, M., Shostak, R., Lamport, L.: Reaching agreement in presense of faults. Journal of the ACM 27(2), 228–234 (1980)MATHCrossRefMathSciNetGoogle Scholar
  21. 21.
    Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst. 11(8), 769–780 (2000)CrossRefGoogle Scholar
  22. 22.
    Tang, L.: Verifiable transaction atomicity for electronic payment protocols. In: ICDCS 1996: Proceedings of the 16th International Conference on Distributed Computing Systems (ICDCS 1996), IEEE Computer Society, Washington (1996)Google Scholar
  23. 23.
    Zhou, J., Onieva, J., Lopez, J.: A synchronous multi-party contract signing protocol improving lower bound of steps. In: SEC 2006: 21st IFIP International Information Security Conference (May 2006)Google Scholar
  24. 24.
    Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Zinaida Benenson
    • 1
  • Felix C. Freiling
    • 2
  • Birgit Pfitzmann
    • 3
  • Christian Rohner
    • 1
  • Michael Waidner
    • 3
  1. 1.Department of Information TechnologyUppsala University 
  2. 2.Computer Science DepartmentUniversity of Mannheim 
  3. 3.IBM ResearchZurich Research Lab 

Personalised recommendations