File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/j.tcs.2014.09.033
- Scopus: eid_2-s2.0-84926319138
- WOS: WOS:000347602000005
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Optimistic fair exchange in the enhanced chosen-key model
Title | Optimistic fair exchange in the enhanced chosen-key model |
---|---|
Authors | |
Keywords | Chosen-key model Enhanced model Optimistic fair exchange |
Issue Date | 2015 |
Citation | Theoretical Computer Science, 2015, v. 562, p. 57-74 How to Cite? |
Abstract | © 2014 Elsevier B.V. Optimistic fair exchange (OFE) is a kind of protocol to guarantee fairness for the parties involved in an exchange with the help of an arbitrator. A fundamental work of optimistic fair exchange is to define security models capturing realistic attacks and design schemes secure in practical models. The security models are very essential to ensure that they capture practical situation, which will ensure that the protocols can be adopted in practice.The contributions of this paper are three fold. First, we observe that the existing OFE models do not capture realistic situation, where the adversary can actually observe the full signatures generated by the signer, prior to launching the actual attack. That is to say, the adversary is not provided with the signing oracle, which will produce full signatures generated by the signer. It is commonly believed that the full signatures generated by the signer can be simulated by the full signatures generated by the arbitrator. Unfortunately, we show that this perception is false. Second, we propose an enhanced model of OFE that explicitly provides the adversary with the signing oracle, which outputs the full signatures generated by the signer. We demonstrate the difference between our enhanced model and the existing chosen-key model through two concrete OFE schemes that serve as counterexamples. Finally, we revisit two existing generic constructions of optimistic fair exchange schemes, one based on verifiably encrypted signatures, and the other based on conventional signatures and ring signatures. Our result shows that the two generic approaches can still offer schemes secure in our enhanced model, which captures the real scenario that dishonest users may have access to the full signatures generated by the signer. |
Persistent Identifier | http://hdl.handle.net/10722/280824 |
ISSN | 2023 Impact Factor: 0.9 2023 SCImago Journal Rankings: 0.570 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, Yang | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Susilo, Willy | - |
dc.date.accessioned | 2020-02-17T14:35:02Z | - |
dc.date.available | 2020-02-17T14:35:02Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | Theoretical Computer Science, 2015, v. 562, p. 57-74 | - |
dc.identifier.issn | 0304-3975 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280824 | - |
dc.description.abstract | © 2014 Elsevier B.V. Optimistic fair exchange (OFE) is a kind of protocol to guarantee fairness for the parties involved in an exchange with the help of an arbitrator. A fundamental work of optimistic fair exchange is to define security models capturing realistic attacks and design schemes secure in practical models. The security models are very essential to ensure that they capture practical situation, which will ensure that the protocols can be adopted in practice.The contributions of this paper are three fold. First, we observe that the existing OFE models do not capture realistic situation, where the adversary can actually observe the full signatures generated by the signer, prior to launching the actual attack. That is to say, the adversary is not provided with the signing oracle, which will produce full signatures generated by the signer. It is commonly believed that the full signatures generated by the signer can be simulated by the full signatures generated by the arbitrator. Unfortunately, we show that this perception is false. Second, we propose an enhanced model of OFE that explicitly provides the adversary with the signing oracle, which outputs the full signatures generated by the signer. We demonstrate the difference between our enhanced model and the existing chosen-key model through two concrete OFE schemes that serve as counterexamples. Finally, we revisit two existing generic constructions of optimistic fair exchange schemes, one based on verifiably encrypted signatures, and the other based on conventional signatures and ring signatures. Our result shows that the two generic approaches can still offer schemes secure in our enhanced model, which captures the real scenario that dishonest users may have access to the full signatures generated by the signer. | - |
dc.language | eng | - |
dc.relation.ispartof | Theoretical Computer Science | - |
dc.subject | Chosen-key model | - |
dc.subject | Enhanced model | - |
dc.subject | Optimistic fair exchange | - |
dc.title | Optimistic fair exchange in the enhanced chosen-key model | - |
dc.type | Article | - |
dc.description.nature | link_to_OA_fulltext | - |
dc.identifier.doi | 10.1016/j.tcs.2014.09.033 | - |
dc.identifier.scopus | eid_2-s2.0-84926319138 | - |
dc.identifier.volume | 562 | - |
dc.identifier.spage | 57 | - |
dc.identifier.epage | 74 | - |
dc.identifier.isi | WOS:000347602000005 | - |
dc.identifier.issnl | 0304-3975 | - |