메뉴 건너뛰기




Volumn 2587, Issue , 2003, Pages 451-464

On fairness in exchange protocols

Author keywords

Exchange protocols; Fair exchange; Fairness; Security properties; Security protocols

Indexed keywords


EID: 35248855514     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36552-4_31     Document Type: Article
Times cited : (20)

References (34)
  • 4
    • 0031650188 scopus 로고    scopus 로고
    • Asynchronous protocols for optimistic fair exchange
    • Research in Security and Privacy, IEEE Computer Society,Technical Committee on Security and Privacy, IEEE Computer Security Press, May
    • N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy, pages 86-99. IEEE Computer Society,Technical Committee on Security and Privacy, IEEE Computer Security Press, May 1998.
    • (1998) Proceedings of the IEEE Symposium on Research in Security and Privacy , pp. 86-99
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 6
    • 0033281266 scopus 로고    scopus 로고
    • Efficient verificable encryption (and fair exchange) of digital signatures
    • Singapore, Nov. ACM Press
    • G. Ateniese. Efficient verificable encryption (and fair exchange) of digital signatures. In 6th ACM Conference on Computer and Communications Security, pages 138-146, Singapore, Nov. 1999. ACM Press.
    • (1999) 6th ACM Conference on Computer and Communications Security , pp. 138-146
    • Ateniese, G.1
  • 9
    • 84974588386 scopus 로고    scopus 로고
    • Timed commitments
    • Advances in Cryptology: Proceedings of Crypto 2000, Springer-Verlag
    • D. Boneh and M. Naor. Timed commitments. In Advances in Cryptology: Proceedings of Crypto 2000, volume 1880 of Lecture Notes in Computer Science, pages 236-254. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 236-254
    • Boneh, D.1    Naor, M.2
  • 10
    • 84947720195 scopus 로고    scopus 로고
    • Off-line fair payment protocols using convertible signatures
    • Advances in Cryptology: Proceedings of Asiacrypt'98, Springer-Verlag
    • C. Boyd and E. Foo. Off-line fair payment protocols using convertible signatures. In Advances in Cryptology: Proceedings of Asiacrypt'98, volume 1514 of Lecture Notes in Computer Science, pages 271-285. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1514 , pp. 271-285
    • Boyd, C.1    Foo, E.2
  • 12
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • June
    • S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, June 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 13
    • 84958060645 scopus 로고    scopus 로고
    • Secure group barter: Multi-party fair exchange with semi-trusted neutral parties
    • M. Franklin and G. Tsudik. Secure group barter: Multi-party fair exchange with semi-trusted neutral parties. Lecture Notes in Computer Science, 1465, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1465
    • Franklin, M.1    Tsudik, G.2
  • 15
    • 84957060126 scopus 로고    scopus 로고
    • Abuse-free optimistic contract signing
    • Advances in Cryptology: Proceedings of Crypto'99, Springer-Verlag
    • J. A. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. In Advances in Cryptology: Proceedings of Crypto'99, volume 1666 of Lecture Notes in Computer Science, pages 449-466. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 449-466
    • Garay, J.A.1    Jakobsson, M.2    MacKenzie, P.3
  • 17
    • 84947904138 scopus 로고    scopus 로고
    • Investigation of non-repudiation protocols
    • ACISP: Information Security and Privacy: Australasian Conference, Springer-Verlag
    • Y. Han. Investigation of non-repudiation protocols. In ACISP: Information Security and Privacy: Australasian Conference, volume 1172 of Lecture Notes in Computer Science, pages 38-47. Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1172 , pp. 38-47
    • Han, Y.1
  • 18
    • 84957613612 scopus 로고
    • Ripping coins for fair exchange
    • L. C. Guillou and J.-J. Quisquater, editors, Advances in Cryptology: Proceedings of Eurocrypt'95, Springer-Verlag, 21-25 May
    • M. Jakobsson. Ripping coins for fair exchange. In L. C. Guillou and J.-J. Quisquater, editors, Advances in Cryptology: Proceedings of Eurocrypt'95, volume 921 of Lecture Notes in Computer Science, pages 220-230. Springer-Verlag, 21-25 May 1995.
    • (1995) Lecture Notes in Computer Science , vol.921 , pp. 220-230
    • Jakobsson, M.1
  • 19
    • 84974678532 scopus 로고    scopus 로고
    • Selective receipt in certified e-mail
    • Advances in Cryptology: Proceedings of Indocrypt 2001, Springer-Verlag, Dec.
    • S. Kremer and O. Markowitch. Selective receipt in certified e-mail. In Advances in Cryptology: Proceedings of Indocrypt 2001, Lecture Notes in Computer Science. Springer-Verlag, Dec. 2001.
    • (2001) Lecture Notes in Computer Science
    • Kremer, S.1    Markowitch, O.2
  • 21
    • 0038441583 scopus 로고    scopus 로고
    • Optimistic fair-exchange with transparent signature recovery
    • 5th International Conference, Financial Cryptography 2001, Springer-Verlag
    • O. Markowitch and S. Saeednia. Optimistic fair-exchange with transparent signature recovery. In 5th International Conference, Financial Cryptography 2001, Lecture Notes in Computer Science. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science
    • Markowitch, O.1    Saeednia, S.2
  • 22
    • 24944538962 scopus 로고    scopus 로고
    • Certified E-mail with invisible post offices
    • Available from author; an invited presentation
    • S. Micali. Certified E-mail with invisible post offices. Available from author; an invited presentation at the RSA '97 conference, 1997.
    • (1997) RSA '97 Conference
    • Micali, S.1
  • 27
    • 0038562431 scopus 로고
    • How to exchange half a bit
    • D. Chaum, editor, New York, Plenum Press
    • T. Tedrick. How to exchange half a bit. In D. Chaum, editor, Advances in Cryptology: Proceedings of Crypto'83, pages 147-151, New York, 1984. Plenum Press.
    • (1984) Advances in Cryptology: Proceedings of Crypto'83 , pp. 147-151
    • Tedrick, T.1
  • 28
    • 85034645810 scopus 로고
    • Fair exchange of secrets
    • G. R. Blakley and D. C. Chaum, editors, Advances in Cryptology: Proceedings of Crypto'84, Springer-Verlag
    • T. Tedrick. Fair exchange of secrets. In G. R. Blakley and D. C. Chaum, editors, Advances in Cryptology: Proceedings of Crypto'84, volume 196 of Lecture Notes in Computer Science, pages 434-438. Springer-Verlag, 1985.
    • (1985) Lecture Notes in Computer Science , vol.196 , pp. 434-438
    • Tedrick, T.1
  • 30
    • 84961312272 scopus 로고    scopus 로고
    • Evolution of fair non-repudiation with TTP
    • ACISP: Information Security and Privacy: Australasian Conference, Springer-Verlag
    • J. Zhou, R. Deng, and F. Bao. Evolution of fair non-repudiation with TTP. In ACISP: Information Security and Privacy: Australasian Conference, volume 1587 of Lecture Notes in Computer Science, pages 258-269. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1587 , pp. 258-269
    • Zhou, J.1    Deng, R.2    Bao, F.3
  • 31
    • 84957806482 scopus 로고    scopus 로고
    • Some remarks on a fair exchange protocol
    • Proceedings of 2000 International Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, Jan.
    • J. Zhou, R. Deng, and F. Bao. Some remarks on a fair exchange protocol. In Proceedings of 2000 International Workshop on Practice and Theory in Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, pages 46-57. Springer-Verlag, Jan. 2000.
    • (2000) Lecture Notes in Computer Science , vol.1751 , pp. 46-57
    • Zhou, J.1    Deng, R.2    Bao, F.3
  • 32
    • 0029724319 scopus 로고    scopus 로고
    • A fair non-repudiation protocol
    • Research in Security and Privacy, IEEE Computer Society,Technical Committee on Security and Privacy, IEEE Computer Security Press, May
    • J. Zhou and D. Gollmann. A fair non-repudiation protocol. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy, pages 55-61. IEEE Computer Society,Technical Committee on Security and Privacy, IEEE Computer Security Press, May 1996.
    • (1996) Proceedings of the IEEE Symposium on Research in Security and Privacy , pp. 55-61
    • Zhou, J.1    Gollmann, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.