A Review of Fair Exchange Protocols

Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues . Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and secured; they should protect both parties from fraudulent users and subsequently promote the growth of e-commerce. There are some protocols, known as fair exchange protocols, in e-commerce that are designed to guarantee fairness between the customer and the merchant so that neither party gains any advantage over the other. Therefore, in this paper, we review these protocols in detail. In addition, we present a survey of three fair exchange protocols based on online TTP from different application areas. In particular, we review these protocols with regard to certain properties, namely, fairness, correctness of product, customer's anonymity, timeliness and channel requirement.

[1]  Manuel Blum,et al.  How to exchange (secret) keys , 1983, TOCS.

[2]  Indrajit Ray,et al.  An anonymous and failure resilient fair-exchange e-commerce protocol , 2005, Decis. Support Syst..

[3]  Silvio Micali,et al.  Simple and fast optimistic protocols for fair electronic exchange , 2003, PODC '03.

[4]  Michael T. Goodrich,et al.  TRICERT: A Distributed Certified E-Mail Scheme , 2001, NDSS.

[5]  Andreas Pfitzmann,et al.  Value exchange systems enabling security and unobservability , 1990, Comput. Secur..

[6]  Markus Jakobsson,et al.  Ripping Coins For a Fair Exchange , 1995, EUROCRYPT.

[7]  N. Asokan,et al.  Optimistic protocols for fair exchange , 1997, CCS '97.

[8]  Hamza Aldabbas,et al.  Adopting E-commerce to User's Needs , 2012, ArXiv.

[9]  Jianying Zhou,et al.  An intensive survey of fair non-repudiation protocols , 2002, Comput. Commun..

[10]  Madhumita Chatterjee,et al.  Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card , 2007, Third International Symposium on Information Assurance and Security.

[11]  Sushil Jajodia,et al.  Avoiding loss of fairness owing to process crashes in fair data exchange protocols , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.

[12]  Vitaly Shmatikov,et al.  Analysis of a Fair Exchange Protocol , 2000, NDSS.

[13]  Abdullah M. S. Alaraj Enforcing Honesty in E-Commerce Fair Exchange Protocols , 2008 .

[14]  Dieter Gollmann,et al.  A fair non-repudiation protocol , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[15]  Malcolm Munro,et al.  An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest , 2008, SAFECOMP.

[16]  Felix C. Freiling,et al.  Approaching a formal definition of fairness in electronic commerce , 1999, Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems.

[17]  Matthias Schunter,et al.  Optimistic fair exchange , 2000 .

[18]  Qing Zhang,et al.  A Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery , 2006, IEEE International Conference on Computer Systems and Applications, 2006..

[19]  Helge Janicke,et al.  Data Confidentiality in Mobile Ad hoc Networks , 2012, ArXiv.

[20]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[21]  Indrajit Ray,et al.  Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components , 2008, Electron. Commer. Res. Appl..

[22]  Ning Zhang,et al.  Practical and efficient fair document exchange over networks , 2006, J. Netw. Comput. Appl..