A Resilient Fair Electronic Contract Signing Protocol

A Resilient Fair Electronic Contract Signing Protocol

Harkeerat Bedi (University of Memphis, USA) and Li Yang (University of Tennessee at Chattanooga, USA)
DOI: 10.4018/978-1-60960-200-0.ch017
OnDemand PDF Download:
List Price: $37.50


Fair exchange between parties can be defined as an instance of exchange such that either all parties involved in the exchange obtain what they expected or neither one does. The authors examine a protocol by Micali that provides fair contract signing, where two parties exchange their commitments over a pre-negotiated contract in a fair manner. They show that Micali’s protocol is not entirely fair and demonstrate the possibilities for one party cheating the other by obtaining the other party’s commitment and not offering theirs. A revised version of this protocol by Bao which provides superior fairness by handling some of the weaknesses is also discussed. However, both these protocols fail to handle the possibilities of a replay attack. Their prior work improves upon these protocols by addressing the weakness that leads to a replay attack. This journal extends their prior work on fair electronic exchange by handling a type of attack which was not handled earlier and provides a brief survey of the recent work related to the field of fair electronic exchange. They also discuss the application of cryptography to our protocol which includes implementation of hybrid cryptography and digital signature algorithms based on elliptic curves to achieve features like confidentiality, data-integrity and non-repudiation.
Chapter Preview

Fair Electronic Exchange

Fair electronic exchange can be demonstrated as e-commerce that takes place between two parties who are online and where exchange of goods and services is performed such that both either parties obtain what they expected or they obtain nothing at all. After an exchange is performed or aborted prematurely, none of the parties should have an unfair advantage over the other. If cheating takes place, where one party refuses to present their part of the exchange, other means for providing fairness should be available. These may include use of additional entities like a human judge or electronic ones that can comprehend the situation and act accordingly to provide fairness. Protocols that provide such facilities are termed as fair exchange protocols. Such protocols can be used for the following purposes:

  • a.

    Certified E-Mail (CEM), where a user named Alice sends a message to user a named Bob and gets a receipt from him in return. Providing the quality of fairness would include Alice getting the receipt only when Bob gets the message or Bob getting the message only when Alice gets the receipt. Associated protocols include (Zhou & Gollmann, 1996; Kremer & Markowitch, 2001; Ateniese & Nita-Rotaru, 2002; Imamoto & Sakurai, 2002)

  • b.

    Electronic Contract Signing (ECS), where both Alice and Bob wish to sign a contract that has already been negotiated. This would involve Alice sending her commitment (digital signature) on the contract to Bob and him sending his commitment (digital signature) on the same in return. Providing fairness would involve Alice receiving Bob’s commitment only when her commitment is received by Bob and vice versa. This example demonstrates contract signing between two parties. Protocols that provide such functionality include (Ben-Or, Goldreich, Micali, & Rivest, 1990; Damgard, 1995; Bao, Deng, & Mao, 1998; Asokan, Shoup, & Waidner, 1998; Ateniese, 1999; Garay, Jakobsson, & MacKenzie, 1999; Micali, 2003; Bao, Wang, Zhou & Zhu, 2004). However, various multi-party contract signing protocols also exist and have also been proposed in (Baum-Waidner, 2001; Ferrer-Gomila, Payeras-Capella, Huguet-Rotger, 2001; Garay & MacKenzie, 1999;

  • c.

    Online payment systems (OPS), where Alice is the seller and Bob is the buyer and payment is given in return of the item of value (Cox, Tygar & Sirbu, 1995). Similar e-payment schemes in electronic commerce include (Boyd & Foo, 1998; Park, Chong, & Siegel, 2003).

  • d.

    Non-repudiation protocols, where the parties involved in an exchange cannot later deny their participation or their actions performed. Protocols associated with such services include (Zhou & Gollmann, 1996; Kremer & Markowitch, 2000; Kremer, Markowitch & Zhou, 2002; Gurgens, Rudolph, & Vogt, 2003)

Complete Chapter List

Search this Book: