×

An identity-based scheme of fair exchange of digital signatures. (English) Zbl 1156.94428

Summary: Fair exchange of digital signatures is an important tool for signing digital contracts, e-payment and other electronic commerce actions. An ID-based scheme of fair exchange of digital signature is proposed in this paper. The protocol relies on a trusted third party, but is “optimistic”, in that the third party is only needed in cases where one player attempts to cheat or simply crashes. The proposed scheme has properties of short signature, low computation and verification cost. It can realize exchange of digital signatures fairly and efficiently. A key feature of our scheme is that it is identity-based, which needs no certificates and has a simple key management. To our best knowledge, this is the first identity-based scheme of fair exchange of digital signatures.

MSC:

94A62 Authentication, digital signatures and secret sharing
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Kamra A, Feng H, Misra V,et al. The Effect of DNS Delays on Worm Propagation in an IPv6 Internet[C].Proc of IEEE Infocom 2005. Miami: IEEE Press, 2005:2405–2014.
[2] Wing S H, Wen W P. A Survey and Trends on Internet Worms[J].Computers & Security, 2005,24(4):334–346. · doi:10.1016/j.cose.2004.10.001
[3] Yu W, Boyer C, Chellappan S,et al. Peer-to-Peer System-Based Active Worm Attacks: Modeling and Analysis[C]//Proc of 2005 IEEE International Conference on Communications. Seoul: IEEE Press, 2005:295–300.
[4] Sourdis I, Pnevmatikatos D. Pre-decoded CAMs for Efficient and High-Speed NIDS Pattern Matching[C]//Proc of 12th Annual IEEE Symposium on Field–Programmable Custom Computing Machines. Napa: IEEE Press, 2004:258–267.
[5] Shankar U, Paxson V. Active Mapping: Resisting NIDS Evasion without Altering Traffic [C]//Proc of IEEE Symp on Security and Privacy. Berkeley: IEEE Press, 2003:44–61.
[6] Schwartz I, Smith H. Infinite Subharmonic Bifurcation in an SEIR Epidemic Model [J].Journal of Mathematical Biology, 1983,18(3):233–253. · Zbl 0523.92020 · doi:10.1007/BF00276090
[7] Zou C, Gong W, Towsley D. Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense [C]//Proc of 2003 ACM Workshop on Rapid Malcode. Washington DC: ACM Press, 2003:51–60.
[8] Staniford S, Paxson V, Weaver N. How to Own the Internet in Your Spare Time[C]//Proc of the 11th USENIX Security Symposium. San Francisco: Usenix Press, 2002: 149–167.
[9] Zou C, Gong W, Towsley D, Code Red Worm Propagation Modeling and Analysis[C]//Proc of ACM Conference on Computer and Communications Security. Washington D C: ACM Press, 2002:138–147.
[10] Kephart J, White S. Directed-Graph Epidemiological Models of Computer Virus [C]//Proc of 1991 IEEE Computer Society Symposium on Research in Security and Privacy. Oakland: IEEE Press, 1991:343–359.
[11] Chen S, Gao X, Kwiat K. Modeling the Spread of Active Worms [C]// Proc of IEEE Infocom. San Francisco: IEEE Press, 2003:1890–1900.
[12] Sun H. P2P Protocols Analysis and Blocking Algorithm [C] //Proc of ICCSA 2005. Singapore: Springer-Verlag, 2005:21–30.
[13] Harren M, Hellerstein J, Huebsch R,et al. Complex Queries in DHT-Based Peer-to-Peer Networks[C]//Proc of IPTPS 2002. Cambridge: Springer Verlag, 2002:242–259. · Zbl 1014.68636
[14] Li M, Muldowney J. Global Stability for the SEIR Model in Epidemiology[J].Mathematical Biosciences, 1995,125(2):155–164. · Zbl 0821.92022 · doi:10.1016/0025-5564(95)92756-5
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.