A Flexible Approach to Secure and Fair Document Exchange
نویسندگان
چکیده
This paper presents a novel protocol for achieving secure and fair document exchange among multiparties. The protocol has the following characteristics: it employs no trusted (third) party when a majority of the parties involved behave honestly; it adopts a technique for integrity and originality verification of messages without use of either asymmetric (public key) or symmetric (conventional) encryption; and it maximises the use of hash and polynomial functions. In comparison with existing protocols, this new protocol has a number of advantages such as better flexibility and reliability. The protocol is also assessed with respect to a set of requirements such as atomicity and assurance.
منابع مشابه
A unified approach to a fair document exchange system
This paper aims to utilise different approaches to fair document exchange to propose a unified approach for the development of a flexible, general and secure fair document exchange system able to guarantee strong fairness for a document exchange among any number of parties under various situations. At the heart of this unified approach are methods for a verifiable and recoverable encryption of ...
متن کاملA traceable optimistic fair exchange protocol in the standard model
An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, which involves in the protocol if it is necessary. But there is a security problem when a...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملA NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL
Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...
متن کاملA New Approach for Accurate Pricing of Reactive Power and Its Application to Cost Allocation in Deregulated Electricity Markets
Reactive power management plays an essential role in the secure operation of the power system as an ancillary service. Although in electricity markets, the particular attention is paid to active power, the reactive power also plays an important on total generation costs of electricity. On the other hand, as it is mainly confined to local consumption, to avoid market power and maintain the se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Comput. J.
دوره 42 شماره
صفحات -
تاریخ انتشار 1999