fair exchange protocols
play

Fair Exchange Protocols Steve Kremer and Mark Ryan Fair Exchnage - PowerPoint PPT Presentation

Fair Exchange Protocols Steve Kremer and Mark Ryan Fair Exchnage Protocols p.1 Examples of fair exchange protocols Electronic purchase of goods exchange of an electronic item against an electronic payment Digital contract signing exchange


  1. Fair Exchange Protocols Steve Kremer and Mark Ryan Fair Exchnage Protocols – p.1

  2. Examples of fair exchange protocols Electronic purchase of goods exchange of an electronic item against an electronic payment Digital contract signing exchange of digital signatures on a given electronic document Non-repudiation protocols exchange of an electronic item and a non-repudiation of origin evidence against the corresponding non-repudiation of receipt evidence Certified e-mail exchange of an electronic message against a proof of receipt Barter an electronic item of a given value is exchanged against another item of a similar value . . . Fair Exchnage Protocols – p.2

  3. An example: digital contract signing Use digital signatures to sign a contract over a network What is the problem ? Alice Bob Signed contract Signed contract Asymmetry: someone must be the first to sign Fairness A protocol is fair if at the end of the protocol, either all participants received the expected item, or none of them received the expected item. Fair Exchnage Protocols – p.3

  4. Evolution of fair exchange protocols protocols requiring a trusted third party (TTP) . . . but create a bottleneck at the TTP Fact: no deterministic contract signing protocol exists without the participation of a TTP . [Even & Yacobi 1980] protocols based on gradual release . . . but need to assume comparable computation power, do not achieve real fairness and require a high number of messages randomised protocols . . . but need to increase the number of messages to decrease the probability that someone may cheat optimistic protocols suppose that most entities are honest, TTP intervention only in case of problem . . . introduced only in 1997 independently by Asokan et al. and Micali Fair Exchnage Protocols – p.4

  5. ✒ � ✏ ✏ ✑ ✒ ✁ ✡ ✂ ✁ ✡ ✂ ✁ ✝ ✁ ☛ ✝ ☎ ✞ ✞ ✞ ☎ ✁ ✟ ✁ � ✟ � ✑ A probabilistic contract signing protocol Alice chooses a random number , and then she chooses random keys . Bob doesn’t know or the keys. Next, Alice and Bob exchange ✁✄✂✆☎ ✁✄✝ ✁✠✟ messages as follows. Each party will timeout and abandon the protocol if there is a delay of time units by the other party in sending the next message. Decryption time is assumed to be much greater than . ☛✌☞✎✍ ack( ) ☞✓✍ Alice Bob ack( ) ack( ) . . . ack( ) Fair Exchnage Protocols – p.5

  6. A first optimistic contract signing protocol Main protocol Promise to sign contract Alice Bob Signed contract Signed contract else recover with TTP Fair Exchnage Protocols – p.6

  7. A first optimistic contract signing protocol (2) Recovery protocol Bob TTP Recovery request (including A’s promise) Contract signed by TTP Alice Contract signed by TTP Note : communication channels between the TTP and participants are supposed to be resilient (all messages eventually arrive). Fair Exchnage Protocols – p.7

  8. A first optimistic contract signing protocol (3) This protocol is fair. But it still has a problem... After having sent the first message Alice can get stuck . Timeliness A protocol provides timeliness if and only if at each moment in the protocol each participant can reach, in a finite amount of time, a point where he can stop the protocol while preserving fairness. Fair Exchnage Protocols – p.8

  9. A second optimistic contract signing protocol Main protocol Alice Bob Promise to sign contract else stop Promise to sign contract else abort with TTP Signed contract else recover with TTP Signed contract else recover with TTP Fair Exchnage Protocols – p.9

  10. A second optimistic contract signing protocol (2) Abort Protocol Alice TTP Abort request if protocol not yet recovered Abort token signed by TTP else Contract signed by TTP Note : The abort token is not a proof that the protocol has been aborted. It is only a promise that the TTP will not allow this protocol to be recovered. Note : Each message of the protocol must contain a unique identifier for the protocol session. Fair Exchnage Protocols – p.10

  11. A second optimistic contract signing protocol (3) TTP Recovery Protocol Recovery request (including B’s promise) Alice if protocol already aborted Abort token signed by TTP else Contract signed by TTP Bob Contract signed by TTP Note : The recovery protocol for Bob is obtained by inversing Alice’s and Bob’s role. Fair Exchnage Protocols – p.11

  12. TTP invisibility The previous protocol is fair and respects timeliness. However, it is possible to determine whether the TTP did intervene or not. Bad publicity! A company could be believed to have cheated whereas in fact it was the network which delayed some messages. Having Alice’s signature on the contract may be preferable to the TTP’s signature. TTP invisibility A TTP producing evidences which are indistinguishable from the ones Alice or Bob would have produced in a faultless scenario is said to be invisible or transparent. Fair Exchnage Protocols – p.12

  13. Verifiable Recoverable Encrypted Signatures A VRES is a cryptographic primitive, which implements a promise of a signature; makes it infeasible for anyone to extract the standard signature except for the TTP; is verifiable, i.e. a verifier will be convinced that the VRES can be converted to a standard signature by the TTP; is recoverable by the TTP , i.e. the TTP can convert the VRES to a standard signature. In a fair exchange protocol use a VRES as a promise to sign the contract (first 2 messages); the VRES can be converted to a standard signature by the TTP in case of a recovery. Fair Exchnage Protocols – p.13

  14. ✪ ✯ ✺ ✂ ✹ ✸ ✟ ✷ ✶ ✵ ☞ ✲ ✴ ✱ ✒ ✻ ✼ ✼ ✢ ✖ ✫ � ★ ✜ ✱ ✢ ✢ ✒ ✬ ✜ ✤ ✻ � ✢ ✲ ✒ � ✼ ✻ ✺ ✏ ✲ ❁ ☞ ✒ ✸ ✟ ✷ ✶ ✏ ✒ ✴ ✒ ✒ � ✏ ✼❀ ✻ ✺ ✏ ✿ ✴ ✾ ✽ ✏ ✰ ✲ ✲ ✘ ✦ ✿ ✙ ✏ ✖ ✣ ✘ ✜ ✺ ✢ ✖ ✜ ✛ ✚ ✚ ✦ ✙ ✻ ✘ ✼❀ ✕ ✗ ✔ ✏ ✖ � ✕ ✒ ✔ ✒ ✴ ✗ ✮ ✤ ✶ ✢ ✖ ✫ ✪ ★ ✜ ✯ ✢ ✢ ✭ ✜ ✮ ✜ ✢ ✘ ✷ ✬ ✑ ✟ ✢ ✢ ✖ ✜ ✛ ✫ ✪ ✸ ✙ ✧ ✴ RSA in a nutshell (1) Key generation Choose two large primes and Compute = Choose , such that and gcd ✢✥✤ Compute , such that ✜✩★ Signature generation for message ✜✩✭ Signature verification ✜✩✭ ✜✩✭ How it works: ✏✳✲ ✏✳✺ since by Fermat’s little thm: Fair Exchnage Protocols – p.14

  15. ✫ ✂ ★ ✜ ★ ❂ ✪ ❂ ✫ ✢ ✝ ✖ ✗ ✖ ✫ ✖ ✪ ✂ ✱ ✭ ✢ ✭ ✤ ✱ ✢ ✝ ✪ ✖ ✣ ✜ ✝ ✖ ✗ ✂ ✖ ✫ ✪ ★ ✜ ✱ ✭ ✯ ✂ ✢ ✝ ✖ ✫ ✪ ★ ✜ ❃ ❂ ✜ ✢ ✖ ✂ ✢ ✦ ✪ ★ ✜ ✙ ✧ ✘ ✗ ✂ ✦ ✫ ✝ ✖ ✛ ✂ ✦ ✂ ✘ ✢ ✝ ✖ ✤ ✂ ✖ ✭ ✫ ✜ ✖ ✫ ✜ ✢ ✚ ✭ ✯ ✢ ✢ ✝ ✖ ✜ ✛ ✪ ✖ ❃ ✙ ✧ ✘ ✗ ✝ ✦ ✪ ✢ ✢ ✂ ✢ RSA in a nutshell (2) Cross-decrytpion property Given two relative prime RSA modula and , choose , and compute and , such that and ✜✩★ Given min : Encryption: the encryption of is: ✜✩★ Decryption: the decryption of is ✯❄❃ ✯❄❅ or How it works: ✜✩✭ ✜✩★ Fair Exchnage Protocols – p.15

  16. ✖ ✖ ❉ ● ✤ ❉ ■ ✢ ❋ ❉ ✗ ✜ ❉ ❆ ✫ ✪ ★ ✜ ✱ ❉ ● ✗ ✮ ❉ ▲▼ ❋ ❉ ■ ✸ ❉ ❏ P ❖ ◆ ❑ ✮ ✢ ❉ ✖ ✫ ✪ ✗ ✜ ✢ ✢ ✤ ❍ ● ✣ ❉ ✖ ✜ ❈ ✢ ❉ ✦ ✣ ✘ ★ ❙ ✜ ✪ ✫ ✖ ❈ ❉ ❇ ❋ ✢ ❋ ✖ ❉ ❉ ✖ ✚ ❉ ● ✜ ❍ ❉ ✢ ❋ ✦ ❉ ✣ ✘ ✣ ❋ ❉ ✖ ✜ ✢ ✢ ✤ A VRES based on RSA signatures Nenadi´ c, Zhang, Barton 2004 Key generation (registration at the TTP) generates an RSA modulus and the correpsonding keys ✖❊❉ ✖❊❉ generates a second RSA modulus (relatively prime with ) and the correpsonding keys which she shares with TTP VRES generation Choose a random prime ✯✎❏ ✜✩✭ ✜✩★ ✷❘◗ ✯✓❏ Fair Exchnage Protocols – p.16

  17. Fair Exchnage Protocols – p.17 ❍ ❉ ❙ ❍ ✢ ❋ ❉ ✖ ✫ ✪ ★ ✜ ✢ ❉ ✜ ✫ ✮ ✗ ❉ ❍ ✤ ✰ ✢ ❋ ❉ ✖ ✫ ✪ ★ ✱ ✪ ✖ ❙ ❉ ✢ ❉ ✬ ✤ ❏ ✯ ✢ ✢ ✭ ✜ ✮ ✜ ✤ ✢ ✖ ❉ ✫ ✪ ❉ ■ ✗ ✂ ❯ ❉ ● ❉ ● ✤ ✢ ❋ ✢ ✜ ✢ ✢ ✮ ❉ ❍ ✤ ✰ ✢ ❉ ✖ ✫ ✪ ✱ ✢ ✢ ✮ ✭ ✜ ✗ ❉ ● ✜ ✤ ✢ ❉ ✖ ✫ ✪ ❉ ✱ ■ ✜ ✗ ✮ ✪ ✜ ✗ ❉ ● ✜ ✤ ✢ ❋ ❉ ✢ ✖ ❍ ✫ ❉ ✜ ✢ ✢ ✪ ✫ ✖ ❉ ■ ✱ ❉ ❋ Note : there exist more efficient VRES scheme which do not require to share a key A VRES based on RSA signatures (2) ✜✩✭ ✜✩★ ✯❚❏ ✯✓❏ ✜✩✭ ✜✩★ VRES verification ✜✩★ VRES recovery ✜✩★ ✜✩★ ✜✩★ . with the TTP ✯✓❏

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend