skip to main content
article

Fair exchange in E-commerce

Authors Info & Claims
Published:01 March 2002Publication History
Skip Abstract Section

Abstract

Many business transactions over the Internet involve the exchange of digital products between two parties - electronic mails, digital audio and video, electronic contract signing and digital signatures, to name a few. Often these transactions occur between players that do not trust each other. To facilitate such transactions, a number of secure protocols have been proposed. The main objective of these protocols is: either both the parties obtain each other's items or none do. Sometimes it is not possible to meet the above objective and researchers have aimed for a weaker objective: gather evidence during protocol execution using which an honest party can prove his case. Protocols which meet any of the two objectives are collectively termed fair exchange protocols. In this paper we review some of the work done on such fair exchange protocols and identify areas that still need to be addressed.

References

  1. ASOKAN, N., SCHUNTER, M., AND WAIDNER, M. 1997. Optimistic Protocols for Fair Exchange. In Proceedings of the 4th ACM Conference on Computer and Communications Security, T. Matsumoto, Ed. Zurich, Switzerland, 7-17.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. ASOKAN, N., SHOUP, V., AND WAIDNER, M. 1998. Optimistic Fair Exchange of Digital Signatures. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Eurocrypt '98. Helsinki, Finland, 591-606.]]Google ScholarGoogle ScholarCross RefCross Ref
  3. BAHREMAN, A. AND TYGAR, J. D. 1994. Certified Electronic Mail. In Proceedings of the Internet Society Symposium on Network and Distributed Systems Security. 3-19.]]Google ScholarGoogle Scholar
  4. BAO, F., DENG, R.H., AND MAO, W. 1998. Efficient and Practical Fair Exchange Protocols with Off-line TTP. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, California.]]Google ScholarGoogle Scholar
  5. BEN-OR, M., GOLDRICH, O., MICALI, S., AND RIVEST, R. 1990. "a fair protocol for signing contracts". IEEE Transactions on Information Theory 36, 1, 40-46.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. BLUM, M. 1983. How to Exchange (Secret) Keys. ACM Transactions on Computer Systems 1, 2 (May), 175-193.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. CHAUM, D. 1985. "security without identification: Transaction systems to make big brother obsolete". Communications of the ACM 28, 10 (Oct.), 1030-1044.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. COX, B., TYGAR, J.D., AND SIRBU, M. 1995. NetBill Security and Transaction Protocol. In Proceedings of the 1st USENIX Workshop in Electronic Commerce. 77-88.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. DENG, R. H., GONG, L., LAZAR, A. A., AND WANG, W. 1996. Practical Protocols for Certified Electronic Mail. Journal of Network and System Management 4, 3, 279-297.]]Google ScholarGoogle ScholarCross RefCross Ref
  10. EVEN, S., GOLDREICH, O., AND LEMPEL, A. 1985. A Randomized Protocol for Signing Contracts. Communications of the ACM 28, 6 (June), 637-647.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. FRANKLIN, M. K. AND REITER, M. K. 1997. Fair Exchange with a semi-trusted Third Party. In Proceedings of the 4th ACM Conference on Computer and Communications Security, T. Matsumoto, Ed. Zurich, Switzerland, 1-6.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. KETCHPEL, S. 1995. Transaction Protection for Information Buyers and Sellers. In Proceedings of the Dartmouth Institute for Advanced Graduate Studies '95: Electronic Publishing and the Information Superhighway.]]Google ScholarGoogle Scholar
  13. LOW, S., MAXEMCHUK, N., AND PAUL, S. 1994. Anonymous Credit Cards. In Proceedings of the 2nd ACM Conference on Computer and Communications Security, J. Stern, Ed. Fairfax, Virginia, 108-117.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. LOW, S. H., MAXEMCHUK, N. F., AND PAUL, S. 1996. Anonymous Credit Cards and Their Collusion Analysis. IEEE/ACM Transactions on Networking 4, 6 (Dec.), 809-816.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. MEDVINSKY, G. AND NEUMAN, B. 1993. Netcash: A design for practical electronic currency on the internet. In Proceedings of the 1st ACM Conference on Computer and Communications Security, Fair fax, VA. 102-106.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. RAY, I. AND RAY, I. 2000. An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution. In Proceedings of the 1st International Conference on Electronic Commerce and Web Technologies. London, U. K.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. RAY, I. AND RAY, I. 2001. "an anonymous fair-exchange e-commerce protocol". In Proceedings of the 1st International Workshop on Internet Computing and E-Commerce, San Francisco, CA.]]Google ScholarGoogle ScholarCross RefCross Ref
  18. RAY, I., RAY, I., AND NARASIMHAMURTHI, N. 2000. A Fair-Exchange Protocol with Automated Dispute Resolution. In Proceedings of the 14th Annual IFIP WG 11.3 Working Conference on Database Security. Schoorl, The Netherlands.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. SANDHOLM, T. AND LESSER, V. 1996. Advantages of a leveled commitment contracting protocol. In Proceedings of the 13th National Conference on Artificial Intelligence. 126-133.]]Google ScholarGoogle Scholar
  20. ZHOU, J. AND GOLLMANN, D. 1996. A Fair Non-repudiation Protocol. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, California, 55-61.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Fair exchange in E-commerce

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM SIGecom Exchanges
              ACM SIGecom Exchanges  Volume 3, Issue 2
              Spring, 2002
              36 pages
              EISSN:1551-9031
              DOI:10.1145/844340
              Issue’s Table of Contents

              Copyright © 2002 Copyright is held by the owner/author(s)

              Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 March 2002

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader