Supporting Fair Exchange in Mobile Environments

被引:0
作者
Holger Vogt
Felix C. Gärtner
Henning Pagnia
机构
[1] Darmstadt University of Technology,Department of Computer Science
来源
Mobile Networks and Applications | 2003年 / 8卷
关键词
mobile commerce; fair exchange; disconnected operations; tamper-proof hardware; time-sensitive items;
D O I
暂无
中图分类号
学科分类号
摘要
Mobile commerce over the Internet always includes the exchange of electronic goods. Fair exchange protocols establish fairness and ensure that both participants can engage in the exchange without the risk of suffering a disadvantage (e.g., losing their money without receiving anything for it). In general, fair exchange protocols require the continuous availability of an external trusted third party (TTP), a dedicated site which is trusted by both participants. Implementations of TTPs for fair exchange have been proposed to be based on carefully secured Internet hosts in order to establish trust. In this paper we present solutions to the fair exchange problem in mobile environments, where customers frequently disconnect from the network and thus continuous availability of the external TTP is not given. Our approach utilizes tamper-poof hardware on the customer's side partly taking over the duties of the TTP. Besides supporting disconnected operations our approach also allows the proper handling of time-sensitive items (i.e., items which lose value over time), a feature which previous protocols lack.
引用
收藏
页码:127 / 136
页数:9
相关论文
共 24 条
  • [1] Blum M.(1983)How to exchange (secret) keys ACM Transactions on Computer Systems 1 175-193
  • [2] Boneh D.(2000)Timed Commitments Advances in Cryptology ‐ CRYPTO'2000 1880 236-254
  • [3] Naor M.(1987)Gradual and verifiable release of a secret Advances in Cryptology ‐ CRYPTO'87 293 156-166
  • [4] Brickell E.F.(1990)Value exchange systems enabling security and unobservability Computers & Security 9 715-721
  • [5] Chaum D.(2001)Rational exchange ‐ A formal model based on game theory Electronic Commerce ‐ WELCOM 2001 2232 114-126
  • [6] Damgård I.B.(1988)Untraceable electronic cash Advances in Cryptology ‐ CRYPTO'88 401 319-327
  • [7] van de Graaf J.(2000)Secure mobile agent-based merchant brokering in distributed marketplaces Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents (ASA/MA2000) 1882 44-56
  • [8] Bürk H.(2000)Solving fair exchange with mobile agents ASA/MA 2000 1882 57-72
  • [9] Pfitzmann A.(2001)Using smart cards for fair exchange Electronic Commerce ‐ WELCOM 2001 2232 101-113
  • [10] Buttyàn L.(1999)A secure pay-per-view scheme for Web-based video service Public Key Cryptography ‐ PKC'99 1560 315-326