
1
mod
() mod
() mod
(, , )
mod
()mod
t
X
t
X
Y
sn
PS n
mPS m n
vhs M
hq
rd
γ
η
η
ω
ωω
µη
γµ
−
−
−
=
Ω=
=
=Ω
=−
=−
⎧
⎪
⎪
⎪
⎪
⎨
⎪
⎪
⎪
⎪
⎩
q
So Y cannot convince any outside party of
the validity of the partial signature of Alice. We
note these verifying operations as the function
( ( ( )), , ( ), , ( ))
XXX
verify pf PS m m PS m PS
ω
. If the
verification fails, it returns false
.
5 CONCLUSIONS
In this paper, we produce two fair payment
protocols providing invisibility of TTP. They use
the RSA-based convertible signature scheme. To
be more efficient and practical for asynchronous
network, we replace the original interactive
verification process with a non-interactive one. To
achieve abuse-freeness in the second protocol, we
use an adaptation of the designated verifiers
proofs by Jakobsson et al.
We have shown that these two protocols
are practical because they meet all important
requirements, their evidences are standardized,
and the communication burden is row in that
they only needs 4 interactions in a faultless
run. Our future work will be focused on the
application of the fair protocols to real
electronic commerce systems like SCM and
CRM.
REFERENCES
Asokan, N., Schunter, M., & Waidner, M. (Apr. 1997).
Optimistic protocols for fair exchange. Proceedings
of the fourh ACM Conference on Computer and
Communications Security, Zurich, Switzerland,
ACM Press, 6, 8-17.
Asokan, N., & Shoup, V. (1998). Optimistic fair
exchange of digital signatures. Advances in
Cryptology -- EUROCRYPT '98, Berlin Germany,
Lecture Notes in Computer Science, Volume 1403,
Springer-Verlag, 591-606.
Boyd, C. & Foo, E. (1998). Off-line Fair Payment
Protocols using Convertible Signatures. Advances in
Cryptology---ASIA CRYPT'98.
Chadha, R., Mitchell, J., Scedrov, A., & Shmatikov, V.
(Sep. 2003). Contract signing, optimism and
advantage. CONCUR 2003 - Concurrency Theory,
14-th International Conference, Marseille, France,
Lecture Notes in Computer Science, Volume 2761,
Springer-Verlag, 366-382.
Garay, J., Jakobsson, M., & MacKenzie, P. (1999).
Abuse-free optimistic contract signing. Advances in
Cryptology - CRYPTO '99, Lecture Notes in
Computer Science, Volume 1666, Springer-Verlag,
449-466.
Gurgens, S., Rudolph, C., & Vogt, H. (Oct. 2003). On
the Security of Fair Non-repudiation Protocols.
Proceedings of 2003 Information Security
Conference, Bristol, UK, Volume 2851, Lecture
Notes in Computer Science, Springer-Verlag,
193-207.
Jakobsson, M., Sako, K., & Impagliazzo, R. (1996).
Designated verifier proofs and their applications.
Eurocrypt'96, Volume 1070, Lecture Notes in
Computer Science, Springer-Verlag, 143-154.
Kremer, S., & Markowitch, O. (May 2000). Optimistic
non-repudiable information exchange. 21th
Symposium on Information Theory in the Benelux,
Werkgemeenschap Informatie- en
Communicatietheorie, Enschede, 139-146.
Markowitch, O., & Kremer, S. (Oct. 2001). An
optimistic non-repudiation protocol with transparent
trusted third party. Information Security: ISC 2001,
Malaga, Spain, volume 2200, Lecture Notes in
Computer Science, Springer-Verlag, 363-378.
Micali, S. (1997). Certified e-mail with invisible post
offices. Available from author: an invited
presentation at the RSA’97 conference.
Saeednia, S., Kremer, S., & Markowitch, O. (Nov.
2003). An efficient strong designated verifier
scheme. 6th International Conference on
Information Security and Cryptology (ICISC 2003),
Lecture Notes in Computer Sciences,
Springer-Verlag. Seoul, Korea. November 2003.
Wang, G. (2003). An Attack on Not-interactive
Designated Verifier Proofs for Undeniable
Signatures. Cryptology ePrint Archive, Report
2003/243. Retrieved Apr. 2004, from
http://eprint.iacr.org/2003/243/.
Gennaro, R., Krawczyk, H., & Rabin, T. (1997).
RSA-based undeniable signatures. Advances in
Cryptology --- CRYPTO '97, volume 1296, Lecture
Notes in Computer Science, Springer Verlag,
132--149.
NEW FAIR PAYMENT PROTOCOLS
203