Get access

Identity-based optimistic fair exchange in the standard model

Authors

  • Lei Zhang,

    Corresponding author
    • Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University, Shanghai, China
    Search for more papers by this author
  • Qianhong Wu,

    1. UNESCO Chair in Data Privacy, Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Tarragona, Catalonia, Spain
    2. Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Computer, Wuhan University, Wuhan, China
    Search for more papers by this author
  • Bo Qin

    1. UNESCO Chair in Data Privacy, Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Tarragona, Catalonia, Spain
    2. Department of Maths, School of Science, Xi'an University of Technology, Xi'an, China
    Search for more papers by this author

Correspondence: Lei Zhang, Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University, no. 3663 Zhongshan Road (North), Shanghai 200062, China.

E-mail: leizhang@sei.ecnu.edu.cn

ABSTRACT

A fair exchange protocol allows two entities to exchange digital signatures over open networks in a fair way, so that either each entity obtains the other's signature or neither entity does. Fair exchange protocol plays an important role in electronic commerce in the case of exchanging digital contracts. In this paper, we propose a fair exchange protocol based on identity-based verifiably encrypted signatures. Our protocol involves an offline trusted third party which is only required when one entity attempts to cheat or crashes. The underlining identity-based verifiably encrypted signature scheme is proven secure under the computational Diffie–Hellman assumption and is the first identity-based verifiably encrypted signature scheme provably secure against existential unforgeable under adaptive chosen message and identity attacks in the standard model. Copyright © 2012 John Wiley & Sons, Ltd.

Get access to the full text of this article

Ancillary