Exclusion-Freeness in Multi-party Exchange Protocols

Similar documents
OPTIMISTIC NON-REPUDIABLE INFORMATION EXCHANGE

A MULTI-PARTY NON-REPUDIATION PROTOCOL

Fair exchange and non-repudiation protocols

Fair Exchange Protocols

Public-key Cryptography: Theory and Practice

Multi-Party Non-Repudiation: A Survey

OPTIMIZING ONE FAIR DOCUMENT EXCHANGE PROTOCOL

Non-repudiation protocols for multiple entities q

Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation

A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps

Verifiably Encrypted Signature Scheme with Threshold Adjudication

A FAIR-EXCHANGE E-COMMERCE PROTOCOL WITH AUTOMATED DISPUTE RESOLUTION

CHAPTER 4 VERIFIABLE ENCRYPTION OF AN ELLIPTIC CURVE DIGITAL SIGNATURE

Imposing fairness in electronic commerce

An IBE Scheme to Exchange Authenticated Secret Keys

Identity-Based Decryption

An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Generic Non-Repudiation Protocols Supporting Transparent Off-line TTP

An Overview of Secure Multiparty Computation

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification

Digital Signatures. KG November 3, Introduction 1. 2 Digital Signatures 2

Two Fair Payment Protocols for E-Commerce Transaction

Security properties of two authenticated conference key agreement protocols

Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme

Covert Identity Information in Direct Anonymous Attestation (DAA)

CPSC 467: Cryptography and Computer Security

Timeout Estimation Using a Simulation Model for Non-repudiation Protocols

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Secure Multiparty Computation

T Cryptography and Data Security

1 A Tale of Two Lovers

CS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong

On the Security of Group-based Proxy Re-encryption Scheme

Cryptography V: Digital Signatures

CS 161 Computer Security

Cryptography V: Digital Signatures

Lecture 10, Zero Knowledge Proofs, Secure Computation

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

Attribute-based encryption with encryption and decryption outsourcing

ECE596C: Handout #9. Authentication Using Shared Secrets. Electrical and Computer Engineering, University of Arizona, Loukas Lazos

CSC 774 Network Security

Formal Verification of e-reputation Protocols 1

1 Defining Message authentication

(In)security of ecient tree-based group key agreement using bilinear map

A Limitation of BAN Logic Analysis on a Man-in-the-middle Attack

A NOTE ON AN ARBITRATED QUANTUM SIGNATURE SCHEME

Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes

On the Diculty of Software Key Escrow. Abstract. At Eurocrypt'95, Desmedt suggested a scheme which allows individuals to encrypt

Session key establishment protocols

Group Key Establishment Protocols

Lecture 3.4: Public Key Cryptography IV

Revisiting optimistic fair exchange based on ring signatures

the validity of the signature can be checked by anyone who has knowledge of the sender's public key. In the signcryption scheme of [4], the unsigncryp

How to Break and Repair Leighton and Micali s Key Agreement Protocol

Authenticated Key Agreement without Subgroup Element Verification

Available online at ScienceDirect. Procedia Computer Science 78 (2016 ) 95 99

Efficient RFID authentication scheme for supply chain applications

Delegatability of an Identity Based Strong Designated Verifier Signature Scheme

Public-key encipherment concept

Public Key Algorithms

A Novel Identity-based Group Signature Scheme from Bilinear Maps

Data Integrity & Authentication. Message Authentication Codes (MACs)

Crypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL))

CPSC 467: Cryptography and Computer Security

Formal Methods and Cryptography

Forward-Secure Signatures for Unbounded Time Periods in Mobile Computing Applications

CS3235 Seventh set of lecture slides

Efficient Compilers for Authenticated Group Key Exchange

A Remote Biometric Authentication Protocol for Online Banking

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Session key establishment protocols

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Game Analysis of Abuse-free Contract Signing

Cryptographic Primitives and Protocols for MANETs. Jonathan Katz University of Maryland

On the Security of a Certificateless Public-Key Encryption

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

Applied Cryptography and Computer Security CSE 664 Spring 2017

Research Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel.

A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS

An Optimistic Fair E-Commerce Protocol for Large

Brief Introduction to Provable Security

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

Cryptographic protocols

Chapter 10 : Private-Key Management and the Public-Key Revolution

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Alternative Protocols for Generalized Oblivious Transfer

CS Computer Networks 1: Authentication

Part VI. Public-key cryptography

Message Authentication with MD5 *

Spring 2010: CS419 Computer Security

CSCI 5440: Cryptography Lecture 5 The Chinese University of Hong Kong, Spring and 6 February 2018

CSE 127: Computer Security Cryptography. Kirill Levchenko

Robust EC-PAKA Protocol for Wireless Mobile Networks

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Transcription:

Exclusion-Freeness in Multi-party Exchange Protocols Nicolás González-Deleito and Olivier Markowitch Université Libre de Bruxelles Bd. du Triomphe CP212 1050 Bruxelles Belgium {ngonzale,omarkow}@ulb.ac.be Abstract. In this paper we define a property for multi-party protocols called exclusion-freeness. In multi-party protocols respecting the strongest definition of this property, participants are sure that they will not be excluded from a protocol s execution and, consequently, they do not have to trust each other any more. We study this property on a wellknown multi-party fair exchange protocol with an online trusted third party and we point out two attacks on this protocol breaking the fairness property and implying excluded participants. Finally, we propose a new multi-party fair exchange protocol with an online trusted third party respecting the strong exclusion-freeness property. 1 Introduction The important growth of open networks such as the Internet has lead to the study of related security problems. Achieving the exchange of electronic information is one of these security challenges. An exchange protocol (contract signing, certified mail,... ) allows therefore two or more parties to exchange electronic information. Such kind of protocols are said to be fair if the exchange is realized in such a way that, at the end of the protocol, any honest participant has received all the expected items corresponding to the items that he has provided. Fair exchange protocols often use a trusted third party (TTP) helping the participants to successfully realize the exchange. Depending on its level of involvement in a protocol, a TTP can be said inline, online or o ine. Inline and online trusted third parties are both involved in each instance of a protocol, but the first one acts as a mandatory intermediary between the participants. An offline TTP is used when the participants in a protocol are supposed to be honest enough to do not need external help in order to achieve fairness; the TTP will be involved only if some problems emerge. Consequently, such protocols are called optimistic. Fair exchange between two parties has been extensively studied and several solutions have been proposed in the online [10,11,7] as in the offline [12,2,5,3,9] case. The multi-party setting has also been studied and it has been noticed that the topology of the exchange plays an important role.

In [1] a generic optimistic protocol with a general topology (each entity can communicate with the set of entities of his choice) is described. However, during this protocol a participant may receive an affidavit from the TTP instead of the expected item. The protocol achieves then what it is called weak fairness. In practice, many proposed multi-party fair exchange protocols [6,4,8] suppose that each party exchanges an item against another and that the exchange s topology is a ring. In other words, each participant P i offers to participant P i+1 a message m i in exchange of a message m i 1 offered by participant P i 1. Of course, all subscripts have to be read mod n, where n is the number of participants in the exchange. (We will omit this hereafter.) The multi-party fair exchange protocol proposed in [6] is based on an online TTP, whereas [4,8] supposed the TTP as being offline. Participants in the protocol described in [4] have to trust, in addition of the TTP, the initiator of the exchange for not becoming passive conspirators. A modified version of this protocol, in which participants do not longer need to trust that participant, was proposed in [8]. Our aim is to introduce a property devoted to multi-party protocols called exclusion-freeness. We illustrate it in the framework of an existing multi-party fair exchange protocol with an online TTP. We describe two attacks on this protocol in which the fairness property is broken and where participants are excluded from the exchange. A modified version of this protocol respecting the strongest flavor of exclusion-freeness is finally proposed. The study of that property on optimistic multi-party fair exchange protocols is the subject of an ongoing work. At the present time, it does not seem possible to obtain the same sort of results presented in this paper on that kind of protocols. The remaining of this paper is organized as follows. In the next section we introduce the concept of exclusion-freeness and some other definitions and notations. In section 3 we describe the multi-party fair exchange protocol with an online TTP proposed by Franklin and Tsudik [6] and present our attacks on this protocol. Finally, we propose in section 4 a new multi-party fair exchange protocol with an online TTP, in which participants cannot be excluded from the exchange. 2 Definitions and Notations Although not explicitly said in the literature, a protocol allowing an exchange of items is composed of a preliminary setup phase, followed by an exchange phase. During the setup phase, entities willing to participate in a given exchange s execution agree on the set of entities who will take part in this exchange, on the items to be exchanged and on how these items will be exchanged during the exchange phase. Upon completion of that setup phase, the exchange phase is performed by the means of a fair exchange protocol. Definition 1. We say that a participant has been excluded from an exchange if (1) he has taken part in the setup phase, (2) it has been agreed during that phase

that he would participate in the exchange phase, (3) a non-empty set of other participants involved in the exchange has prevented him to successfully complete the corresponding exchange phase. In the following sections we will look at two multi-party fair exchange protocols with an online TTP. In order to study their exclusion issues, we introduce the following definitions. Definition 2. A passive conspirator of a coalition of participants excluding some other entities from a multi-party protocol s run is an honest participant who (1) is not excluded, (2) cannot prevent this coalition to succeed, (3) by its idleness contributes to keep the excluded participants uninformed about the protocol s execution which takes place. Definition 3. A multi-party protocol is said to be weakly exclusion-free if, at the end of any execution of this protocol, any excluded participant is able to prove to an external adjudicator that he has been excluded. Definition 4. A multi-party protocol is called strongly exclusion-free if, at the end of any execution of this protocol, there will be no excluded participants. As a consequence of these definitions, we note that in a protocol not providing strong exclusion-freeness any honest participant has to trust the remaining participants for not being excluded. The following definitions deal with the quality of the communication channels and with the basic properties that an exchange protocol must respect. Definition 5. A communication channel is said to be operational if the messages inserted into it are delivered within a known amount of time. A resilient communication channel delivers data after a nite, but unknown, amount of time. Finally, a communication channel is unreliable if it is neither operational nor resilient. Definition 6. Disregarding the quality of the communication channels, an exchange protocol is said to be consistent if when all the participants implied in the exchange are honest then they all obtain their expected information. Definition 7. An exchange protocol is said to be fair if, at the end of any execution of this protocol, any honest participant has received all the expected items corresponding to the items that he has provided. Through this paper we will use the following notations: A B : denotes Alice sending a message to Bob; A β : denotes Alice multicasting a message to the set of participants β (a one-to-many communication); A : denotes Alice broadcasting a message (a one-to-any communication); E ea (m) is the result of applying an asymmetric encryption algorithm E to the plaintext m under Alice s public key e A.

3 A Fair Exchange Protocol with an Online TTP We describe here the multi-party fair exchange protocol with an online trusted third party proposed by Franklin and Tsudik [6]. The protocol assumes that the exchange is cyclic, i.e. an entity P i, i [1, n], sends his secret information m i to P i+1 in exchange of P i 1 s secret information m i 1 ; P n sends his information to P 1. In their protocol, the authors assume the presence of a third party which is semi-trusted. Such a third party is trusted to ensure the fairness during a protocol s run, but as long as all the entities involved in the protocol remain honest the semi-trusted third party will not succeed in trying to learn the information to be exchanged. The authors also consider that all the exchanged messages are private and authentic. The scheme is based on the use of a homomorphic one-way function f and a n-variable function F n such that F n (x 1, f (x 2 ),..., f (x n )) = f (x 1 x 2 x n ). The authors propose that f (y) = y 2 mod N and F n (y 1, y 2,..., y n ) = y 2 1y 2 y n mod N, where N is the product of two large distinct primes. At the end of the setup phase: each participant knows the identity of the remaining participants in the exchange; the participants in the exchange have agreed on the identity of the TTP that will be contacted during the protocol s execution and on the functions f and F that will be used; and the descriptions of the messages to be exchanged, f(m i ), i [1, n], are made public. 3.1 The Protocol Each user P i begins the protocol by choosing a random value R i and sending it to P i+1. Upon receiving R i 1, each entity P i computes C i = m i R 1 i and A i = F n (m i, f (m 1 ),..., f (m i 1 ), f (m i+1 ),..., f (m n )), and sends them to the TTP along with f (R i ). The TTP compares the received A i. If they are all equal, it computes C = C 1 C n. It also computes F n+1 (C, f (R 1 ),..., f (R n )), which should be equal to f (m 1 m n ), and verifies whether one A i is equal to this last computation. If all the checks pass, the TTP broadcasts C = {C j 1 j n} to all the entities. After having received C from the TTP, each P i can verify for which C j, j [1, n], f(c j R i 1 ) is equal to f(m i 1 ), and obtain then m i 1. Here is a summary of that protocol:

1. i [1, n]: P i P i+1 : R i. 2. i [1, n]: P i TTP: A i, C i, f(r i ). 3. TTP : C. 3.2 An Attack Aiming to Break the Fairness Property Unfortunately, this protocol is not fair. When communicating with the TTP an entity, say P i, can choose a random value R distinct from the R i transmitted to P i+1 at the previous step of the protocol and can therefore transmit to the TTP the normal A i, C i = m i R 1 and f( R). The TTP will not be able to realize that the random R provided by P i is different from the random R i received by P i+1. Indeed, the TTP compares all the received A j, which are not related to R i nor R, and computes F n+1 (C 1 C n, f (R 1 ),..., f (R i 1 ), f( R), f (R i+1 ),..., f (R n )), which should be equal to any A j. On the other hand, P i+1 will obtain from the TTP the set of all C j (where j [1, n]). P i+1 has to compute ˆm j = C j R i, for all j [1, n] until f ( ˆm j ) = f (m i ). Unfortunately, for P i+1 this last equality will never be verified. He will not retrieve his expected item and the fairness will then be broken. Recall that P i excludes P i+1 from the exchange with the passive assent of the remaining participants, who become passive conspirators of P i. 3.3 An Attack Aiming to Exclude Participants from the Exchange Franklin and Tsudik describe [6] two types of deviances of the third party causing the lost of fairness for the target entities. These misbehaviors lead honest participants to become passive conspirators of the third party. The authors discuss therefore about ways to counter such a behavior from the third party when all the participants in the protocol are honest. However, these solutions imply that participants do not longer trust the TTP for being honest, which is contradictory with the definition of a semi-trusted third party. It is unusual to reduce the trust accorded to a TTP at the price of having all the participants to trust each other. This is particularly unrealistic in a multi-party framework. Considering that a TTP is a trusted entity, it seems to us that it is either considered that it behaves correctly, or it is not a trusted third party. We present now a second exclusion attack with passive conspirators not mentioned by the authors of the original paper. Suppose that P i decides to exclude P i+1 from the exchange. If the one-way function f is, as in [6], such that f(a) f(b) = f(ab), which with discrete arithmetic one-way functions is a reasonable assumption, then P i can act as described hereunder.

P i follows normally the protocol, except that he does not send his random value R i to P i+1. The protocol does not say that the entities have to wait to receive the random value of the previous entity before sending their own random to the next one. Then, P i+1 sends his random to P i+2, etc. The only entity having not received his expected random value is then P i+1. Therefore, in order to remain in a fair state, P i+1 does not continue the protocol because he will be not able to retrieve m i without R i. All the entities except P i and P i+1 contact the TTP as described in the second step of the protocol. P i+1 does not send anything and P i contacts the TTP by sending to the latter C i = m i R 1 i, A i = F n (m i, f(m 1 ),..., f(m i 1 ), f(m i+1 ),..., f(m n )), and f(r i ) f(m i+1 ) instead of f(r i ). For all j in [1, n], with j i + 1, A j = f(m 1 m n ). The TTP computes then F n (C 1 C i C i+2 C n, f(r 1 ),..., f(r i 1 ), f(r i ) f(m i+1 ), f(r i+2 ),..., f(r n )), which is equal to all the A j, and cannot therefore detect that P i+1 has not contacted him. Note that P i+1 is excluded but remains in a fair state (he does not receive m i and does not send m i+1 ). However, P i+2 sends his message m i+2 without receiving P i+1 s message m i+1. The fairness is then broken. This attack allows P i to exclude P i+1 and P i+2 with the passive assent of the remaining participants. Therefore, under our assumptions, this protocol is not strongly nor weakly exclusion-free, it implies passive conspirators and does not respect the fairness property. 4 A Strongly Exclusion-Free Fair Exchange Protocol We present now a variant of the multi-party fair exchange protocol with an online trusted third party described in the previous section, partially inspired by the two-party protocol of Franklin and Reiter [7]. The exchange topology is still a ring. The communication channels between participants are unreliable and those used between each participant and the TTP are supposed to be resilient. Through this section we will use the following additional notations: f x is a flag indicating the purpose of a message in a given protocol, where x identifies the corresponding message in that protocol; S A (m) denotes the digital signature of Alice over the message m; in the description of a protocol s message, S A ( ) denotes the digital signature of Alice over all information preceding this signature; P is the set {P 0, P 1,..., P n 1 } of all the participants in the exchange;

label is an information identifying a protocol s run; it results from applying P and the descriptions of all the messages to be exchanged to a one-way hash function. At the end of the setup phase: each participant knows the identity of the remaining participants in the exchange; the participants in the exchange have agreed on the identity of the TTP that will be contacted during the protocol s execution and on the functions f and F that will be used; the set P and the label are known by all the participants in the exchange; and the descriptions of the messages to be exchanged, f(m i ), i [0, n 1], are made public. We use a label in order to prevent exclusion attacks. This label will allow the TTP to verify if all the agreed participants are taking part in the exchange phase. During the protocol, when receiving a signed message, each entity checks the validity of the signature. If the verification fails, the message is not considered. 4.1 The Protocol As in the original protocol, each participant P i chooses a random value R i and sends it, in a private way, to P i+1. Upon receiving R i 1, each P i computes C i = m i R 1 i and A i = F n (m i, f(m 0 ),..., f(m i 1 ), f(m i+1 ),..., f(m n 1 )), and sends E ettp (C i ) and A i to the TTP along with f(r i ) and f(r i 1 ), the label and the set P agreed during the setup phase of the protocol. In order to avoid attacks from entities not belonging to P, for each received message the TTP verifies if its sender is included in the set P found in the message. The TTP also verifies if this set and the public information corresponding to all the participants in P are consistent with the label that has been sent. If not, the TTP discards the message. After a deadline chosen by the TTP, the latter verifies if the set of identities of the participants having contacted him with the same label is equal to the corresponding set P. If so, the TTP checks if for each i [0, n 1] the f(r i ) sent by P i is equal to the f(r i ) sent by P i+1 and if the f(r i 1 ) sent by P i is equal to the f(r i 1 ) sent by P i 1. If these two firsts checks succeed, the TTP verifies that all the received A i are equal. If so, he computes C = C 0 C n 1 and F n+1 (C, f(r 0 ),..., f(r n 1 )). If this second computation is equal to any A i, then the TTP multicasts C = {C j 0 j n 1} to all the participants in the exchange. Any participant P i can therefore verify for which C j, with j in [0, n 1], f(c j R i 1 ) = f(m i 1 ) holds, and can retrieve m i 1. Here are the three steps of that protocol:

1. i [0, n 1]: P i P i+1 : f 1, P i+1, label, E epi+1 (R i ), S Pi ( ). 2. i [0, n 1]: P i TTP: f 2, TTP, label, P, A i, E ettp (C i ), f(r i ), f(r i 1 ), S Pi ( ). 3. TTP P: f 3, P, label, C, S TTP ( ). 4.2 Analysis Property 1. The protocol is consistent. If all the participants in the exchange are honest, then all the random values R i, with i in [0, n 1], will be properly exchanged and every participant will be able to contact the TTP during the second step of the protocol. All the verifications on the identities of the participants contacting the TTP and on the items to exchange will then succeed and the TTP will multicast the set C to all the participants in P, who will be able to retrieve their corresponding expected information m i 1 = C i 1 R i 1, with i in [0, n 1]. Property 2. The proposed protocol is fair. When the first step of the protocol has been completed, only participants having received the ciphered random value will contact the TTP. The remaining participants will stop the protocol in order to stay in a fair state. After a chosen deadline, the TTP will verify if the set of identities of the participants having contacted him with the same label is equal to the corresponding set P included in their messages. (As the labels are identical, the sets P that they provide should also be identical.) The TTP will only continue if all the agreed participants realize that second step of the protocol. The TTP will also verify if the exchanged random values are those submitted to him during the second step of the protocol and if the received C j, with j in [0, n 1], are consistent with the items to exchange agreed during the setup phase of the protocol. If the above tests succeed, the TTP will multicast C to all the participants in the exchange and every entity will be able to recover his expected message. Otherwise, the TTP will not multicast C and the fairness property will also be respected as no participant will receive anything. Property 3. The proposed protocol achieves strong exclusion-freeness under the assumption that the underlying signature scheme is secure against forgery attacks. As described above, after a chosen deadline the TTP will verify if the set of identities of the participants having contacted him with the same label is equal to the corresponding set P agreed during the setup phase of the protocol. If some participants have not realized that second step, then the TTP will stop the protocol.

Unless some dishonest entity is able to impersonate a participant having been excluded from an exchange s execution by forging his digital signature, the TTP will stop the protocol before verifying if the items to be exchanged are those agreed during the setup phase of the protocol. Therefore, any exclusion attack will be aborted by the TTP. 5 Conclusion We have defined the notion of being excluded from an exchange s execution and clarified the concept of a passive conspirator of a coalition excluding some other participants from an exchange. We have introduced the notions of weak and strong exclusion-freeness, and we have pointed out that the participants in a protocol respecting the strong exclusion-freeness property do not longer need to trust each other for not being excluded from an execution of this protocol. We have illustrated those notions in the framework of multi-party fair exchange protocols with an online TTP. Therefore, we have described a well-known fair exchange protocol and we have presented two attacks on it breaking the fairness property and leading moreover to passive conspirators and excluded participants. Finally, we have proposed a new multi-party fair exchange protocol with an online TTP, in which participants cannot be excluded from the exchange, i.e. respecting the strong exclusion-freeness property. The study of exclusionfreeness aspects in optimistic multi-party fair exchange protocols is the subject of an ongoing work. At the present time, achieving the same sort of results on that kind of protocols does not seem possible. References 1. N. Asokan, M. Schunter, and M. Waidner. Optimistic protocols for multi-party fair exchange. Research Report RZ 2892 (# 90840), IBM Research, Dec. 1996. 2. N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 86 99. IEEE Computer Society Press, May 1998. 3. N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications, 18(4):593 610, Apr. 2000. 4. F. Bao, R. Deng, K. Q. Nguyen, and V. Vardharajan. Multi-party fair exchange with an off-line trusted neutral party. In DEXA 99 Workshop on Electronic Commerce and Security, Sept. 1999. 5. F. Bao, R. H. Deng, and W. Mao. Efficient and practical fair exchange protocols with off-line TTP. In Proceedings of the 19th IEEE Computer Society Symposium on Research in Security and Privacy, pages 77 85. IEEE, May 1998. 6. M. Franklin and G. Tsudik. Secure group barter: Multi-party fair exchange with semi-trusted neutral parties. In Proceedings of the International Conference on Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, pages 90 102. Springer-Verlag, 1998.

7. M. K. Franklin and M. K. Reiter. Fair exchange with a semi-trusted third party. In 4th ACM Conference on Computer and Communications Security, pages 1 5. ACM Press, Apr. 1997. 8. N. González-Deleito and O. Markowitch. An optimistic multi-party fair exchange protocol with reduced trust requirements. In Proceedings of the 4th International Conference on Information Security and Cryptology, volume 2288 of Lecture notes in Computer Science, pages 258 267. Springer-Verlag, Dec. 2001. 9. O. Markowitch and S. Saeednia. Optimistic fair-exchange with transparent signature recovery. In Proceedings of the 5th International Conference on Financial Cryptography, Lecture notes in Computer Science. Springer-Verlag, Feb. 2001. 10. N. Zhang and Q. Shi. Achieving non-repudiation of receipt. The Computer Journal, 39(10):844 853, 1996. 11. J. Zhou and D. Gollmann. A fair non-repudiation protocol. In IEEE Symposium on Security and Privacy, Research in Security and Privacy, pages 55 61. IEEE Computer Security Press, May 1996. 12. J. Zhou and D. Gollmann. An efficient non-repudiation protocol. In Proceedings of the 10th IEEE Computer Security Foundations Workshop, pages 126 132. IEEE Computer Society Press, 1997.