Abstract
We present new protocols for two parties to exchange documents with fairness, i.e., such that no party can gain an advantage by quitting prematurely or otherwise misbehaving. We use a third party that is `semi-trusted', in the sense that it may misbehave on its own but will not conspire with either of the main parties. In our solutions, disruption by any one of the three parties will not allow the disrupter gain any useful new information about the documents. Our solutions are efficient and can be based on any of several cryptographic assumptions (e.g., factoring, discrete log, graph isomorphism). We also discuss the application of our techniques to electronic commerce protocols to achieve fair payment.
Cite
CITATION STYLE
Franklin, M. K., & Reiter, M. K. (1997). Fair exchange with a semi-trusted third party. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 1–5). ACM.
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.