Abstract
We present a new protocol that allows two players to exchange digital signatures over the Internet in a fair way, so that either each player gets the other's signature, or neither player does. The obvious application is where the signatures represent items of value, for example, an electronic check or airline ticket. The protocol can also be adapted to exchange encrypted data. The protocol relies on a trusted third party, but is “optimistic,” in that the third party is only needed in cases where one player attempts to cheat or simply crashes. A key feature of our protocol is that a player can always force a timely and fair termination, without the cooperation of the other player.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
N. Asokan, M. Schunter, and M. Waidner. Optimistic protocols for fair exchange. In 4th ACM Conference on Computer and Communication Security, pages 6–17, 1997.
N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of dig-ital signatures. IBM Research Report RZ 2973, available on-line at www.cs.wisc.edu/~shoup, 1997.
N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. In Proc. IEEE Symp. on Research in Security and Privacy, 1998. Available on-line at www.cs.wisc.edu/~shoup.
M. Bellare and S. Goldwasser. Encapsulated key escrow. Preprint, 1996.
M. Bellare and P. Rogaway. Random oracles are practical: a paradigm for design-ing efficient protocols. In First ACM Conference on Computer and Communica-tions Security, 1993.
M. Bellare and P. Rogaway. Optimal asymmetric encryption. In Advances in Cryptology—Crypto '94, pages 92–111, 1994.
S. Brands. Untraceable off-line cash in wallets with observers. In Advances in Cryptology-Crypto '93, pages 302–318, 1993.
H. Bürk and A. Pfitzmann. Value exchange systems enabling security and unob-servability. Computers and Security, 9:715–721, 1990.
D. Chaum and T. Pederson. Wallet databases with observers. In Advances in Cryptology-Crypto '92, pages 89–105, 1992.
B. Cox, J. D. Tygar, and M. Sirbu. NetBill security and transaction protocol. In First USENIX Workshop on Electronic Commerce, pages 77–88, 1995.
R. H. Deng, L. Gong, A. A. Lazar, and W. Wang. Practical protocols for certified electronic mail. J. of Network and Systems Management, 4(3), 1996.
A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. In Advances in Cryptology—Crypto '86, pages 186–194, 1986.
M. K. Franklin and M. K. Reiter. Verifiable signature sharing. In Advances in Cryptology-Eurocrypt '95, pages 50–63, 1995.
M. K. Franklin and M. K. Reiter. Fair exchange with a semi-trusted third party. In 4th ACM Conference on Computer and Communications Security, pages 1–5, 1997.
L. Guillou and J. Quisquater. A “paradoxical” identity-based signature scheme resulting from zero-knowledge. In Advances in Cryptology-Crypto '88, pages 216–231, 1988.
D. W. Kravitz. Digital signature algorithm, 1993. U. S. Patent No. 5,231,668.
C. H. Lim and P. J. Lee. More flexible exponentiation with precomputation. In Advances in Cryptology-Crypto '94, pages 95–107, 1994.
S. Micali. Certified e-mail with invisible post offices. Unpublished manuscript, 1997 (presented at the 1997 RSA Security Conference).
H. Ong and C. Schnorr. Fast signature generation with a Fiat Shamir-like scheme. In Advances in Cryptology-Eurocrypt '90, pages 432–440, 1990.
C. Rackoff and D. Simon. Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack. In Advances in Cryptology-Crypto '91, pages 433–444, 1991.
R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, pages 120–126, 1978.
C. Schnorr. Efficient signature generation by smart cards. J. Cryptology, 4:161–174, 1991.
V. Shoup. Lower bounds for discrete logarithms and related problems. In Advances in Cryptology-Eurocrypt '97, 1997.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Asokan, N., Shoup, V., Waidner, M. (1998). Optimistic fair exchange of digital signatures. In: Nyberg, K. (eds) Advances in Cryptology — EUROCRYPT'98. EUROCRYPT 1998. Lecture Notes in Computer Science, vol 1403. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0054156
Download citation
DOI: https://doi.org/10.1007/BFb0054156
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64518-4
Online ISBN: 978-3-540-69795-4
eBook Packages: Springer Book Archive