TY - GEN
T1 - Threshold-oriented optimistic fair exchange
AU - Wang, Yang
AU - Au, Man Ho Allen
AU - Liu, Joseph K.
AU - Yuen, Tsz Hon
AU - Susilo, Willy
PY - 2013/9/9
Y1 - 2013/9/9
N2 - Fair exchange protocol aims to allow two parties to exchange digital items in a fair manner. It is well-known that fairness can only be achieved with the help of a trusted third party, usually referred to as arbitrator. A fair exchange protocol is optimistic if the arbitrator is not involved in the normal execution of the fair exchange process. That is, its presence is necessary only when one of the exchanging parties is dishonest. Traditionally, the items being exchanged are digital signatures. In this paper, we consider the items to be threshold signatures. Specifically, the signatures are created by a subset of legitimate signers instead of a single signer. We define a security model for this new notion, and provide an concrete instantiation. Our instantiation can be proven secure in the random oracle model. Our definition covers the case when the item being exchanged is a secret key of an identity-based encryption where the master secret key is split amongst a set of authorities.
AB - Fair exchange protocol aims to allow two parties to exchange digital items in a fair manner. It is well-known that fairness can only be achieved with the help of a trusted third party, usually referred to as arbitrator. A fair exchange protocol is optimistic if the arbitrator is not involved in the normal execution of the fair exchange process. That is, its presence is necessary only when one of the exchanging parties is dishonest. Traditionally, the items being exchanged are digital signatures. In this paper, we consider the items to be threshold signatures. Specifically, the signatures are created by a subset of legitimate signers instead of a single signer. We define a security model for this new notion, and provide an concrete instantiation. Our instantiation can be proven secure in the random oracle model. Our definition covers the case when the item being exchanged is a secret key of an identity-based encryption where the master secret key is split amongst a set of authorities.
UR - http://www.scopus.com/inward/record.url?scp=84883400114&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-38631-2_31
DO - 10.1007/978-3-642-38631-2_31
M3 - Conference article published in proceeding or book
SN - 9783642386305
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 424
EP - 438
BT - Network and System Security - 7th International Conference, NSS 2013, Proceedings
T2 - 7th International Conference on Network and System Security, NSS 2013
Y2 - 3 June 2013 through 4 June 2013
ER -