Novel Design of Fair Exchange Protocol for Semi-trusted Server and Its Application in Cloud Environment

被引:3
作者
Wang, Chih-Hung [1 ]
Wang, Chien-Ming [1 ]
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi, Taiwan
来源
2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS) | 2016年
关键词
Fair exchange; semi-trusted server; cloud computing; proxy re-encryption;
D O I
10.1109/AsiaJCIS.2016.22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The messages can be exchanged in a fair manner if after the protocol, both exchanging parties can simultaneously obtain their desired messages or none of them can get useful information. Since the network communication is time consuming, the major approach for this issue is to develop a off-line trusted third party (off-line TTP) which gets involved into the exchange procedure only if at least one party is dishonest for delivering her/his messages. This paper focuses on a new design for the semi-trusted server that can be easily implemented and eliminates the assumption of private channel between the two parties compared with Franklin and Reiter's approach. Furthermore, this kind of design can also be used for the encrypted message fair exchange in cloud computing environment; that is, if two parties want to exchange the messages stored in cloud with encrypted forms, the TTP then acts as a proxy server to help them by fair re-encryptions of these two ciphertexts in an efficient way.
引用
收藏
页码:130 / 135
页数:6
相关论文
共 17 条
[1]  
[Anonymous], LNCS
[2]   Optimistic fair exchange of digital signatures [J].
Asokan, N ;
Shoup, V ;
Waidner, M .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (04) :593-610
[3]   Efficient and practical fair exchange protocols with off-line TTP [J].
Bao, F ;
Deng, RH ;
Mao, WB .
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, :77-85
[4]   HOW TO EXCHANGE (SECRET) KEYS [J].
BLUM, M .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (02) :175-193
[5]  
Boyd C, 1998, LECT NOTES COMPUT SC, V1514, P271
[6]  
Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
[7]  
Chen LQ, 1998, LECT NOTES COMPUT SC, V1514, P286
[8]  
Deng R. H., 1996, Journal of Network and Systems Management, V4, P279, DOI 10.1007/BF02139147
[9]   A RANDOMIZED PROTOCOL FOR SIGNING CONTRACTS [J].
EVEN, S ;
GOLDREICH, O ;
LEMPEL, A .
COMMUNICATIONS OF THE ACM, 1985, 28 (06) :637-647
[10]  
Franklin M.K., 1997, Proceedings of the 4th ACM Conference on Computer and Communications Security, P1