Application of the Fair Secret Exchange Protocols in the Distribution of Electronic Invoices

Abstract Exchange of digital goods may not be as easy to perform as it seems. We must consider the fact that one or both participants of the exchange may be dishonest and simply try to misbehave and disappear after gaining some kind of advantage over the other participant. Therefore, it is important to design exchange protocols in such a way that no one can cheat. Either all participants receive the electronic goods they expect or all participants receive nothing at all, provided that any of the participating parties abstained from, or aborted the exchange at any time before the end. Protocols which are designed in such a manner are called fair secret exchange protocols. Fairness of a protocol guarantees that no party can misbehave, and even if they manage to do so, they will be caught and prosecuted. In this paper, we suggest a protocol for fair distribution of invoices based on the aforementioned protocols, and we conduct an experiment that evaluates how the security and fairness of the process of sharing an electronic invoice between the issuer and the customer is increased. The proposed protocol’s fairness and performance evaluation results are also presented.

[1]  Tom Tedrick,et al.  How to Exchange Half a Bit , 1983, CRYPTO.

[2]  Fabio Babiloni,et al.  Neurophysiological Tools to Investigate Consumer's Gender Differences during the Observation of TV Commercials , 2014, Comput. Math. Methods Medicine.

[3]  S. Holloway Customs , 2012, Past Imperfect.

[4]  Tatsuaki Okamoto,et al.  Optimistic Fair Exchange Protocol for E-Commerce , 2006 .

[5]  Jian Wang,et al.  A time sequence protocol to achieve the effect of fair exchange without trusted third party , 2014 .

[6]  Indrajit Ray,et al.  An anonymous fair exchange e-commerce protocol , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[7]  Michael K. Reiter,et al.  Fair Exchange with a Semi-Trusted Third Party (extended abstract) , 1997, CCS.

[8]  Philippe Camacho Fair Exchange of Short Signatures without Trusted Third Party , 2013, CT-RSA.

[9]  Sonja Utz,et al.  Knowledge acquisition from social platforms based on network distributions fitting , 2015, Comput. Hum. Behav..

[10]  Qiong Huang,et al.  P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures , 2014, CT-RSA.

[11]  Duncan S. Wong,et al.  Provably secure robust optimistic fair exchange of distributed signatures , 2016, Future Gener. Comput. Syst..

[12]  Nigel Thomas,et al.  Performance Modelling of Optimistic Fair Exchange , 2016, ASMTA.

[13]  S. Vaudenay,et al.  Fair Exchange with Guardian , 2003 .

[14]  Mudhakar Srivatsa,et al.  ExchangeGuard: a distributed protocol for electronic fair-exchange , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[15]  Piotr Bródka,et al.  A picture is worth a thousand words: an empirical study on the influence of content visibility on diffusion processes within a virtual world , 2016, Behav. Inf. Technol..

[16]  Juan A. Garay,et al.  Timed Fair Exchange of Standard Signatures , 2003, IACR Cryptology ePrint Archive.

[17]  Ivan Damgård Practical and Provably Secure Release of a Secret and Exchange of Signatures , 1993, EUROCRYPT.

[18]  Albert Levi,et al.  A Fair Multimedia Exchange Protocol , 2005, ISCIS.

[19]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[20]  Manuel Blum How to exchange (secret) keys , 1983, STOC '83.

[21]  Jarosław Wątróbski,et al.  Multistage Performance Modelling in Digital Marketing Management , 2016 .

[22]  Wojciech Sałabun,et al.  Application of the Characteristic Objects Method in Supply Chain Management and Logistics , 2016 .

[23]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[24]  Indrajit Ray,et al.  Fair exchange in E-commerce , 2002, SECO.

[25]  Ren-Junn Hwang,et al.  Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce , 2015, Symmetry.

[26]  Serge Vaudenay,et al.  Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing , 2004, ACISP.

[27]  Indrajit Ray,et al.  An anonymous and failure resilient fair-exchange e-commerce protocol , 2005, Decis. Support Syst..

[28]  Tom Tedrick,et al.  Fair Exchange of Secrets , 1984, CRYPTO.

[29]  Serge Vaudenay,et al.  Optimal Fair Exchange with Guardian Angels , 2003, WISA.