Skip to main content
Log in

Formal analysis and design of multi-party fair exchange protocols

  • Published:
Science in China Series F: Information Sciences Aims and scope Submit manuscript

Abstract

Based on the origin of message items and channel combination between transacting parties, and events and relations among events, this paper presents a concise, precise, and hierarchical model for general fair exchange protocols, formally specifies various security requirements which are able to reflect inherent requirements for fair exchange protocols more rigorously, and partition these security requirements with fine granularity. This work helps analyze, debug, and design multi-party fair exchange protocols more effectively and elaborately.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Kremer, S., Formal analysis of optimistic fair exchange protocols, PhD thesis, Universit’e Libre de Bruxelles Facult’e des Sciences, 2003–2004.

  2. Qing, S. H., Li, G. C., A formal model of fair exchange protocols Science in China, Series F, 2005, 48(4): 499–512.

    Article  MATH  MathSciNet  Google Scholar 

  3. Thayer, J., Herzog, J. C., Guttman, J. D., Mixed strand spaces, in Proceedings of the 12th IEEE Computer Security Foundations Workshop (CSFW 1999), Mordano: IEEE Computer Society, 1999, 72–82.

    Chapter  Google Scholar 

  4. Birgit, B. W., Optimistic asynchronous multi-party contract signing with reduced number of rounds, in ICALP 2001, Lecture Notes in Computer Science 2076 (eds. Orejas, F., Spirakis, P. G., Leeuwen, J. V.), Crete, Greece, London: Springer-Verlag, 2001, 898–911.

    Google Scholar 

  5. Kremer, S., Markowitch, O., Zhou, J. Y., An intensive survey of non-repudiation protocols, Computer Communications, 2002, 25(17): 1606–1621.

    Article  Google Scholar 

  6. Franklin, M. K., Tsudik, G., Secure group barter: Multi-party fair exchange with semi-trusted neutral parties, in Second Conference on Financial Cryptography (FC 1998), Lecture Notes in Computer Science 1465 (ed. Hirschfeld, R.), Anguilla, British West Indies: Springer-Verlag, 1998, 90–102.

    Google Scholar 

  7. Gonz’alez-Deleito, N., Markowitch, O., Exclusion-freeness in multi-party exchange protocols, in the 5th Information Security Conference, Lecture Notes in Computer Science 2433 (eds. Chan, A. H., Gligor, V. D.), London: Springer-Verlag, 2002, 200–209.

    Google Scholar 

  8. Onieva, J., Zhou, J. Y., Carbonell, M. et al., A multi-party non-repudiation protocol for exchange of different messages, in the 8th IFIP International Information Security Conference (eds. Gritzalis, D., Sabrina De Capitani di Vimercati, Samarati, P. et al.), Athens: Kluwer, 2003, 37–48.

    Google Scholar 

  9. Garay, J. A., MacKenzie, P. D., Abuse-free multi-party contract signing, in International Symposium on Distributed Computing, Lecture Notes in Computer Science 1693 (ed. Jayanti, P.), Bratislava, Slavak Republic, Springer-Verlag, 1999, 151–165.

    Google Scholar 

  10. Birgit, B. W., Michael, W., Round-optimal and abuse free optimistic multi-party contract signing, in ICALP 2000, Lecture Notes in Computer Science 1853 (eds. Montanari, U., Rolim, J. D. P., Welzl, E.), Geneva, Switzerland: Springer-Verlag, 2000, 524–535.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qing Sihan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Qing, S., Li, G. Formal analysis and design of multi-party fair exchange protocols. SCI CHINA SER F 49, 155–174 (2006). https://doi.org/10.1007/s11432-006-0155-2

Download citation

  • Received:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-006-0155-2

Keywords

Navigation