期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
A Formal Model for Analyzing Fair Exchange Protocols Based on Event Logic
1
作者 Ke Yang Meihua Xiao Zehuan Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2641-2663,共23页
Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and elec... Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and electronic contract signing,ensuring the reliability and security of network transactions.In order to address the limitations of current research methods and enhance the analytical capabilities for fair exchange protocols,this paper proposes a formal model for analyzing such protocols.The proposed model begins with a thorough analysis of fair exchange protocols,followed by the formal definition of fairness.This definition accurately captures the inherent requirements of fair exchange protocols.Building upon event logic,the model incorporates the time factor into predicates and introduces knowledge set axioms.This enhancement empowers the improved logic to effectively describe the state and knowledge of protocol participants at different time points,facilitating reasoning about their acquired knowledge.To maximize the intruder’s capabilities,channel errors are translated into the behaviors of the intruder.The participants are further categorized into honest participants and malicious participants,enabling a comprehensive evaluation of the intruder’s potential impact.By employing a typical fair exchange protocol as an illustrative example,this paper demonstrates the detailed steps of utilizing the proposed model for protocol analysis.The entire process of protocol execution under attack scenarios is presented,shedding light on the underlying reasons for the attacks and proposing corresponding countermeasures.The developedmodel enhances the ability to reason about and evaluate the security properties of fair exchange protocols,thereby contributing to the advancement of secure network transactions. 展开更多
关键词 fair exchange protocols fairNESS formal analysis logic reasoning
下载PDF
MULTI-ITEM FAIR EXCHANGE SCHEME 被引量:2
2
作者 Zheng Dong Chen Kefei (Dept. of Computer Science Engineering, Shanghai Jiaotong Univ., Shanghai 200030) 《Journal of Electronics(China)》 2002年第4期363-368,共6页
As more business is conduced over the Internet, the fair exchange problem assumes increasing importance. However, the problem of multi-party fair exchange has not been studied as widely as the more fundamental problem... As more business is conduced over the Internet, the fair exchange problem assumes increasing importance. However, the problem of multi-party fair exchange has not been studied as widely as the more fundamental problem of 2-party fair exchange. Recently, Franklin arid Tsudik proposed two protocols for n-party multi-item exchange on FC'98, SUCEX-1 and SUCES-2. This paper first gives an attack on the proposed protocol SUCEX-1, then presents two protocols for multi-item exchange, one is an improved protocol of SUCEX-1, another is the extension of protocol SUCEX-2. 展开更多
关键词 Electronic commerce fair exchange PROTOCOL
下载PDF
An Identity-Based Scheme of Fair Exchange of Digital Signatures
3
作者 YU Yong YANG Bo YANG Guoqing 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1761-1764,共4页
Fair exchange of digital signatures is an important tool for signing digital contracts, e-payment and other electronic commerce actions. An ID-based scheme of fair exchange of digital signature is proposed in this pap... Fair exchange of digital signatures is an important tool for signing digital contracts, e-payment and other electronic commerce actions. An ID-based scheme of fair exchange of digital signature is proposed in this paper. The protocol relies on a trusted third party, but is "optimistic", in that the third party is only needed in cases where one player attempts to cheat or simply crashes. The proposed scheme has properties of short signature, low computation and verification cost. It can realize exchange of digital signatures fairly and effic, iently. A key feature of our scheme is that it is identity-based, which needs no certificates and has a simple key management. To our best knowledge, this is the first identity based scheme of fair exchange of digital signatures. 展开更多
关键词 IDENTITY-BASED fair exchange digital signature
下载PDF
Blockchain-Based Secure and Fair IoT Data Trading System with Bilateral Authorization 被引量:2
4
作者 Youngho Park Mi Hyeon Jeon Sang Uk Shin 《Computers, Materials & Continua》 SCIE EI 2023年第8期1871-1890,共20页
These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairnes... These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other.Therefore,in this paper,a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption.The proposed system enables bilateral authorization,where data trading between a seller and a buyer is accomplished only if their policies,required by each other,are satisfied simultaneously.This can be achieved by exploiting the security features of the matchmaking encryption.To guarantee non-repudiation and fairness between trading parties,the proposed system leverages a smart contract to ensure that the parties honestly carry out the data trading protocol.However,the smart contract in the proposed system does not include complex cryptographic operations for the efficiency of onchain processes.Instead,these operations are carried out by off-chain parties and their results are used as input for the on-chain procedure.The system also uses an arbitration protocol to resolve disputes based on the trading proof recorded on the blockchain.The performance of the protocol is evaluated in terms of off-chain computation overhead and on-chain gas consumption.The results of the experiments demonstrate that the proposed protocols can enable the implementation of a cost-effective data trading system. 展开更多
关键词 Bilateral authorization blockchain data marketplace fair exchange policy matching secure data trading
下载PDF
Formal analysis and design of multi-party fair exchange protocols
5
作者 QING Sihan1,2,3 & LI Gaicheng1,3 1. Engineering Research Center for Information Security Technology, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China 2. Beijing Zhongke Ansheng Corporation of Information Technology, Beijing 100080, China 3. Graduate School of the Chinese Academy of Sciences, Beijing 100039, China 《Science in China(Series F)》 2006年第2期155-174,共20页
Based on the origin of message items and channel combination between transacting parties, and events and relations among events, this paper presents a concise, precise, and hierarchical model for general fair exchange... Based on the origin of message items and channel combination between transacting parties, and events and relations among events, this paper presents a concise, precise, and hierarchical model for general fair exchange protocols, formally specifies various security requirements which are able to reflect inherent requirements for fair exchange protocols more rigorously, and partition these security requirements with fine granularity. This work helps analyze, debug, and design multi-party fair exchange protocols more effectively and elaborately, 展开更多
关键词 fair exchange logical protocol formal model security requirement.
原文传递
Is It Fair to Award Additional Examination Points in Exchange for Donating Blood?
6
《ChinAfrica》 2014年第11期12-13,共2页
A policy adopted in Pujiang County, east China's Zhejiang Province, has triggered an online debate as it says students can get additional scores in the high school entrance examination if their parents donate blood t... A policy adopted in Pujiang County, east China's Zhejiang Province, has triggered an online debate as it says students can get additional scores in the high school entrance examination if their parents donate blood to the local blood bank. According to the controversial regulation, students can receive additiona one to three scores if their parents donate 4,000-8,000 milliliters of blood. 展开更多
关键词 Is It fair to Award Additional Examination Points in exchange for Donating Blood
下载PDF
A Protocol for Fair Electronic Purchase Based on Concurrent Signatures
7
作者 LI Xiangdong WANG Qingxian CHEN Li 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期609-614,共6页
E-commerce protocols for the electronic purchase of goods are difficult to design and implement due to their complexity and high security demands. Fairness of such protocols in literature highly depends on an addition... E-commerce protocols for the electronic purchase of goods are difficult to design and implement due to their complexity and high security demands. Fairness of such protocols in literature highly depends on an additional TTP(trusted third party). However, it is difficult to find such a TTP in some situations. In addition, fairness for customers has been neither fully considered nor well satisfied in existing electronic purchasing protocols. In this paper, a new protocol FEP (fair electronic purchase) without a special TTP but an online bank is presented based on a concurrent digital signature scheme. The FEP protocol guarantees fair electronic purchase of goods via electronic payment between consumers, merchants and their online banks. The protocol is practical and the analysis based on the game logics shows that it achieves the properties of viability, fairness, and timeliness. 展开更多
关键词 electronic purchasing protocol fair exchange concurrent signature game logic
下载PDF
EAR Protocol-Towards Fair Optimistic Non-Repudiation Exchange
8
作者 WANG Hai-yan WANG Ru-chuan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2005年第2期59-63,共5页
Fairness is of crucial importance for the exchange protocols via Internet . Non-repudiation therefore becomes one of the vital premises, which are essential in the exchange of sensitive and important messages. This pa... Fairness is of crucial importance for the exchange protocols via Internet . Non-repudiation therefore becomes one of the vital premises, which are essential in the exchange of sensitive and important messages. This paper is to propose a new exchange protocol, termed "EAR" Exchange Protocol as it consists of three sub-protocols : Exchange sub-protocol, Abort sub-protocol and Recovery sub-protocol. It is to be argued that the incorporation of these three sub-protocols may effectively enables EAR to assure non-repudiation, strong fairness, timeliness, confidentiality and the minimized involvement of the Trusted Third Party (TTP). 展开更多
关键词 NON-REPUDIATION fair exchange PROTOCOL TTP
原文传递
Key substitution attacks on some verifiably encrypted signature schemes
9
作者 夏琦 Xu Chunxiang Yu Yong 《High Technology Letters》 EI CAS 2011年第2期191-195,共5页
As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and mos... As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and most of them were proven secure under certain complexity assumptions. In this paper, however, we find that although some schemes are secure in a single-user setting, they are not secure in a multi-user setting any more. We show that Zhang, et al. ' s scheme, Gorantla, et al. ' s scheme and Ming, et al. ' s scheme are vulnerable to key substitution attacks, where an adversary can generate new keys satisfying legitimate verifiably encrypted signatures created by the legitimate users. We also show that this kind of attacks can breach the fairness when they are used in fair exchange in a multi-user setting. 展开更多
关键词 CRYPTOGRAPHY fair exchange verifiably encrypted signature key substitution attack
下载PDF
Design and formal verification of a CEM protoco with transparent TTP 被引量:1
10
作者 Zhiyuan LIU Jun PANG Chenyi ZHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第2期279-297,共19页
In certified email (CEM) protocols, trusted third party (TTP) transparency is an important security require- ment which helps to avoid bad publicity as well as protecting individual users' privacy. Cederquist et ... In certified email (CEM) protocols, trusted third party (TTP) transparency is an important security require- ment which helps to avoid bad publicity as well as protecting individual users' privacy. Cederquist et al. proposed an opti- mistic certified email protocol, which employs key chains to reduce the storage requirement of the TTE We extend their protocol to satisfy the property of TTP transparency, using existing verifiably encrypted signature schemes. An imple- mentation with the scheme based on bilinear pairing makes our extension one of the most efficient CEM protocols satis- fying strong fairness, timeliness, and TTP transparency. We formally verify the security requirements of the extended pro- tocol. The properties of fairness, timeliness and effectiveness are checked in the model checker Mocha, and TTP trans- parency is formalised and analysed using the toolsets/~CRL and CADE 展开更多
关键词 fair exchange CEM protocols fairNESS TTPtransparency formal verification
原文传递
A privacy-preserving statistics marketplace using local differential privacy and blockchain: An application to smart-grid measurements sharing 被引量:2
11
作者 Nikos Fotiou Iakovos Pittaras +2 位作者 Vasilios A.Siris George C.Polyzos Priit Anton 《Blockchain(Research and Applications)》 2021年第1期56-64,共9页
Service providers usually require detailed statistics in order to improve their services.On the other hand,privacy concerns are intensifying and sensitive data is protected by legislation,such as GDPR(General Data Pro... Service providers usually require detailed statistics in order to improve their services.On the other hand,privacy concerns are intensifying and sensitive data is protected by legislation,such as GDPR(General Data Protection Regulation).In this paper,we present the design,implementation,and evaluation of a marketplace that allows“data consumers”to buy information from“data providers”,which can then be used for generating meaningful statistics.Additionally,our system enables“system operators”that can select which data providers are allowed to provide data,based on filtering criteria specified by the data consumer.We leverage local differential privacy to protect the data provider's privacy against data consumers,as well as against system operators,and we build a blockchain-based solution for ensuring fair exchange,and immutable data logs.Our design targets use cases that involve hundreds or even thousands of data providers.We prove the feasibility of our approach through a proof-of concept implementation of a measurement sharing application for smart-grid systems. 展开更多
关键词 Auditability Ethereum fair exchange Smart contracts
原文传递
Generalization of perfect concurrent signatures
12
作者 YE Qing ZHENG Shi-hui +1 位作者 GUO Hong-fu YANG Yi-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2012年第6期94-104,共11页
Recently, Susilo et al.'s perfect concurrent signature scheme (PCS1) and Wang et al.'s improved perfect concurrent signature scheme (iPCS1) are proposed, which are considered as good improvements on concurrent s... Recently, Susilo et al.'s perfect concurrent signature scheme (PCS1) and Wang et al.'s improved perfect concurrent signature scheme (iPCS1) are proposed, which are considered as good improvements on concurrent signatures, and they adopt the same algorithms. In this paper, we develop generic perfect concurrent signature algorithms of which Susilo et al. and Wang et al.'s algorithms turn out to be a special instance. We also obtain numerous new, efficient variants from the generic algorithms which have not been proposed before. To display the advantage of these variants, a modified privacy-preserving PCS protocol is given. It shows that the new variants adapt to the protocol well and can form concrete privacy-preserving PCS schemes, while the original algorithms do not. Security proofs and efficiency analysis are also given. 展开更多
关键词 GENERALIZATION perfect concurrent signature fair exchange VARIANT Schnorr
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部