Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures

被引:0
|
作者
Jae Hong Seo
Keita Emura
Keita Xagawa
Kazuki Yoneyama
机构
[1] Myongji University,
[2] National Institute of Information and Communications Technology,undefined
[3] NTT Secure Platform Laboratories,undefined
[4] Ibaraki University,undefined
来源
International Journal of Information Security | 2018年 / 17卷
关键词
Optimistic fair exchange; Homomorphic signatures; Verifiably encrypted signatures;
D O I
暂无
中图分类号
学科分类号
摘要
Let us consider a situation where a client (Alice) frequently buys a certain kind of product from a shop (Bob) (e.g., an online music service sells individual songs at the same price, and a client buys songs multiple times in a month). In this situation, Alice and Bob would like to aggregate the total transactions and pay once per month because individual payments are troublesome. Though optimistic fair exchange (OFE) has been considered in order to swap electronic items simultaneously, known OFE protocols cannot provide such aggregate function efficiently because various costs are bounded by the number of transactions in the period. In order to run this aggregation procedure efficiently, we introduce a new kind of OFE called accumulable OFE (AOFE) that allows clients to efficiently accumulate payments in each period. In AOFE, any memory costs, computational costs, and communication complexity of the payment round must be constant in terms of the number of transactions. Since a client usually has just a low power and poor memory device, these efficiencies are desirable in practice. Currently, known approaches (e.g., based on verifiably encrypted signature scheme) are not very successful for constructing AOFE. Thus, we consider a new approach based on a new cryptographic primitive called verifiably encrypted homomorphic signature scheme (VEHS). In this paper, we propose a generic construction of AOFE from VEHS and also present a concrete VEHS scheme over a composite-order bilinear group by using the dual-form signature techniques. This VEHS scheme is also of independent interest. Since we can prove the security of VEHS without random oracles, our AOFE protocol is also secure without random oracles. Finally, we implemented our AOFE protocol, and it is efficient enough for practical use.
引用
收藏
页码:193 / 220
页数:27
相关论文
共 50 条
  • [41] A gradual and optimistic fair exchange protocol
    Lan, Tian
    Qin, Zhiguang
    Zhao, Yang
    Hu, Xiong
    Li, Liu
    2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 452 - +
  • [42] An Optimistic Fair Protocol for Aggregate Exchange
    Liu, Yichun
    2009 SECOND INTERNATIONAL CONFERENCE ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, FITME 2009, 2009, : 564 - 567
  • [43] Asynchronous protocols for optimistic fair exchange
    Asokan, N
    Shoup, V
    Waidner, M
    1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 86 - 99
  • [44] Performance Modelling of Optimistic Fair Exchange
    Zhao, Yishi
    Thomas, Nigel
    Analytical and Stochastic Modelling Techniques and Applications, 2016, 9845 : 298 - 313
  • [45] Optimistic Fair Exchange with Multiple Arbiters
    Kuepcue, Alptekin
    Lysyanskaya, Anna
    COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 488 - 507
  • [46] A Traceable Optimistic Fair Exchange Protocol
    Ganjavi, Ramin
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 161 - 166
  • [47] An Efficient Verifiably Encrypted Signature from Weil Pairing
    Shen, Jian
    Zheng, Wenying
    Wang, Jin
    Zheng, Yuhui
    Sun, Xingming
    Lee, Sungyoung
    JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (06): : 947 - 952
  • [48] Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management
    Wang, Yujue
    Pang, HweeHwa
    Deng, Robert H.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (03) : 347 - 363
  • [49] Efficient CDH-Based Verifiably Encrypted Signatures with Optimal Bandwidth in the Standard Model
    Zhou, Yuan
    Qian, Haifeng
    AD-HOC, MOBILE, AND WIRELESS NETWORKS, 2011, 6811 : 164 - 176
  • [50] Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management
    Yujue Wang
    HweeHwa Pang
    Robert H. Deng
    International Journal of Information Security, 2018, 17 : 347 - 363