Fair Exchange with Guardian Angels

نویسندگان

  • Gildas Avoine
  • Serge Vaudenay
چکیده

In this paper we propose a new probabilistic Fair Exchange Protocol which requires no central Trusted Third Party. Instead, it relies on a virtually distributed and decentralized Trusted Third Party which is formalized as a Guardian Angel: a kind of Observer e.g. a tamper proof security device. We thus introduce a network model with Pirates and Guardian Angels which is well suited for Ad Hoc networks. In this setting we reduce the Fair Exchange Problem to a Synchronization Problem in which honest parties need to eventually decide whether or not a protocol succeeded in a synchronous way through a hostile network which does not guaranty that sent messages will be eventually received. This problem can be of independent interest in order to add reliability of protocol termination in secure channels.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A traceable optimistic fair exchange protocol in the standard model

An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, which involves in the protocol if it is necessary. But there is a security problem when a...

متن کامل

Developing a Paradigm for Fair Valuation in Tehran Stock Exchange

The concept of value is of great importance for investors. The goal of different groups of investors is always to maximize the value of their capital. The aim of this research is developing factors effective on securities in capital market in order to develop a paradigm for fair valuation that leads investors to make better decisions. To study fair value in a precise and comprehensive way, effe...

متن کامل

Security of smartphones at the dawn of their ubiquitousness

The importance of researching in the field of smartphone security is substantiated in the increasing number of smartphones, which are expected to outnumber common computers in the future. Despite their increasing importance, it is unclear today if mobile malware will play the same role for mobile devices as for common computers today. Therefore, this thesis contributes to defining and structuri...

متن کامل

Abstract Model of Fault Tolerance Algorithm in Cloud Computing Communication Networks

Model of Fault Tolerance Algorithm in Cloud Computing Communication Networks Pardeep Kumar, Deptt. of CSE & ICT, Jaypee University of Information Technology, Waknaghat, solan (H.P)India Email: [email protected] Shiv Kumar Gupta, Deptt. Of CSE & ICT, Jaypee University of Information Technology, Waknaghat, Solan(H.P)-India Email: [email protected] Abstract--We discussed in this pap...

متن کامل

A methodology for verification of digital items in fair exchange protocols with active trustee

Fair exchange constitutes a fundamental mechanism for electronic commerce. Fair exchange assumes that it is possible to verify the correctness of the digital items to be exchanged. However, when an item is indescribable, i.e., it cannot be formally specified, its verification becomes difficult, if not impossible. This hinders a practical deployment of fair exchange. We propose a methodology for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003