2012
DOI: 10.1145/2168260.2168263
|View full text |Cite
|
Sign up to set email alerts
|

Efficiency of optimistic fair exchange using trusted devices

Abstract: Efficiency of asynchronous optimistic fair exchange using trusted devices is studied. It is shown that three messages in the optimistic sub-protocol are sufficient and necessary for exchanging idempotent items. When exchanging non-idempotent items, however, three messages in the optimistic sub-protocol are sufficient only under the assumption that trusted devices have unbounded storage capacity. This assumption is often not satisfiable in practice. It is then proved that exchanging non-idempotent items using t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 23 publications
(27 reference statements)
0
2
0
Order By: Relevance
“…As a result, a protocol is required to guarantee that no party can cheat during the RD procedure. This issue has been addressed well in the literature of fair-exchange protocols (e.g., [20], [25], [26]), especially for wireless environments. Regardless of the differences among such protocols, there are two involved parties (called Alice and Bob), and one entity as a mediator (Trusted Third Party (TTP)) in "optimistic" class of these protocols.…”
Section: Transaction Protocolmentioning
confidence: 99%
“…As a result, a protocol is required to guarantee that no party can cheat during the RD procedure. This issue has been addressed well in the literature of fair-exchange protocols (e.g., [20], [25], [26]), especially for wireless environments. Regardless of the differences among such protocols, there are two involved parties (called Alice and Bob), and one entity as a mediator (Trusted Third Party (TTP)) in "optimistic" class of these protocols.…”
Section: Transaction Protocolmentioning
confidence: 99%
“…Trusted devices have been applied in a range of situations: for instance to solve the fair exchange problem [46], [47], to provide secure storage primitives [48] and in secure multiparty computation [49]. Trusted sensors have been considered recently by several authors [44], [50], [51].…”
Section: Background and Related Workmentioning
confidence: 99%