A Resilient Fair Electronic Contract Signing Protocol

A Resilient Fair Electronic Contract Signing Protocol

Harkeerat Bedi, Li Yang
ISBN13: 9781609602000|ISBN10: 1609602005|EISBN13: 9781609602024
DOI: 10.4018/978-1-60960-200-0.ch017
Cite Chapter Cite Chapter

MLA

Bedi, Harkeerat, and Li Yang. "A Resilient Fair Electronic Contract Signing Protocol." Security and Privacy Assurance in Advancing Technologies: New Developments, edited by Hamid Nemati, IGI Global, 2011, pp. 271-294. https://doi.org/10.4018/978-1-60960-200-0.ch017

APA

Bedi, H. & Yang, L. (2011). A Resilient Fair Electronic Contract Signing Protocol. In H. Nemati (Ed.), Security and Privacy Assurance in Advancing Technologies: New Developments (pp. 271-294). IGI Global. https://doi.org/10.4018/978-1-60960-200-0.ch017

Chicago

Bedi, Harkeerat, and Li Yang. "A Resilient Fair Electronic Contract Signing Protocol." In Security and Privacy Assurance in Advancing Technologies: New Developments, edited by Hamid Nemati, 271-294. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-200-0.ch017

Export Reference

Mendeley
Favorite

Abstract

Fair exchange between parties can be defined as an instance of exchange such that either all parties involved in the exchange obtain what they expected or neither one does. The authors examine a protocol by Micali that provides fair contract signing, where two parties exchange their commitments over a pre-negotiated contract in a fair manner. They show that Micali’s protocol is not entirely fair and demonstrate the possibilities for one party cheating the other by obtaining the other party’s commitment and not offering theirs. A revised version of this protocol by Bao which provides superior fairness by handling some of the weaknesses is also discussed. However, both these protocols fail to handle the possibilities of a replay attack. Their prior work improves upon these protocols by addressing the weakness that leads to a replay attack. This journal extends their prior work on fair electronic exchange by handling a type of attack which was not handled earlier and provides a brief survey of the recent work related to the field of fair electronic exchange. They also discuss the application of cryptography to our protocol which includes implementation of hybrid cryptography and digital signature algorithms based on elliptic curves to achieve features like confidentiality, data-integrity and non-repudiation.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.