Fair exchange with a semi-trusted third party

197Citations
Citations of this article
52Readers
Mendeley users who have this article in their library.

Abstract

We present new protocols for two parties to exchange documents with fairness, i.e., such that no party can gain an advantage by quitting prematurely or otherwise misbehaving. We use a third party that is `semi-trusted', in the sense that it may misbehave on its own but will not conspire with either of the main parties. In our solutions, disruption by any one of the three parties will not allow the disrupter gain any useful new information about the documents. Our solutions are efficient and can be based on any of several cryptographic assumptions (e.g., factoring, discrete log, graph isomorphism). We also discuss the application of our techniques to electronic commerce protocols to achieve fair payment.

Cite

CITATION STYLE

APA

Franklin, M. K., & Reiter, M. K. (1997). Fair exchange with a semi-trusted third party. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 1–5). ACM.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free