Skip to main content

Fair exchange with a semi-trusted third party

Publication ,  Conference
Franklin, MK; Reiter, MK
Published in: Proceedings of the ACM Conference on Computer and Communications Security
January 1, 1997

We present new protocols for two parties to exchange documents with fairness, i.e., such that no party can gain an advantage by quitting prematurely or otherwise misbehaving. We use a third party that is `semi-trusted', in the sense that it may misbehave on its own but will not conspire with either of the main parties. In our solutions, disruption by any one of the three parties will not allow the disrupter gain any useful new information about the documents. Our solutions are efficient and can be based on any of several cryptographic assumptions (e.g., factoring, discrete log, graph isomorphism). We also discuss the application of our techniques to electronic commerce protocols to achieve fair payment.

Duke Scholars

Published In

Proceedings of the ACM Conference on Computer and Communications Security

Publication Date

January 1, 1997

Start / End Page

1 / 5
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Franklin, M. K., & Reiter, M. K. (1997). Fair exchange with a semi-trusted third party. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 1–5).
Franklin, M. K., and M. K. Reiter. “Fair exchange with a semi-trusted third party.” In Proceedings of the ACM Conference on Computer and Communications Security, 1–5, 1997.
Franklin MK, Reiter MK. Fair exchange with a semi-trusted third party. In: Proceedings of the ACM Conference on Computer and Communications Security. 1997. p. 1–5.
Franklin, M. K., and M. K. Reiter. “Fair exchange with a semi-trusted third party.” Proceedings of the ACM Conference on Computer and Communications Security, 1997, pp. 1–5.
Franklin MK, Reiter MK. Fair exchange with a semi-trusted third party. Proceedings of the ACM Conference on Computer and Communications Security. 1997. p. 1–5.

Published In

Proceedings of the ACM Conference on Computer and Communications Security

Publication Date

January 1, 1997

Start / End Page

1 / 5