Properties of secure transaction protocols

Abstract Communication protocols are the computational basis for distributed electronic commerce systems, and thus the properties of these protocols define the forms of commerce possible in electronic systems. Existing protocols used for electronic commerce focus primarily on security properties, including message integrity, privacy and non-repudiation, and on basic transaction properties, usually just atomicity; their structural properties are limited to supporting two-party transactions with fixed semantics. We believe that the properties provided by these protocols limit their use to simple forms of commerce. In this paper we define the properties we believe are necessary for electronic commerce protocols. These include the security properties of existing protocols, and extend the transactional properties to include isolation and causality. Causality is a new property for transactions. It allows the order of the messages in a completed transaction to be independently verified, and thus inferences can be made about causal relationship between messages. We also extend the structural properties to support scalability, layering and separation of roles. Scalable protocols allow several parties to join each transaction. Protocol layering enables arbitrary transaction semantics and greater system modularity. Separation of roles provides independent adjudication of disputes between transaction participants and allows the use of varied exchange media. We term a protocol with the above properties a secure transaction protocol. Lastly, we present a protocol that provides these properties. We believe that this protocol can be used to support more complex and extended forms of electronic commerce than existing protocols.

[1]  Mohamed G. Gouda,et al.  A protocol for secure transactions , 1996 .

[2]  Leslie Lamport,et al.  Time, clocks, and the ordering of events in a distributed system , 1978, CACM.

[3]  J. D. Tygar,et al.  Building blocks for atomicity in electronic commerce , 1996 .

[4]  Marvin A. Sirbu,et al.  NetBill: An Internet commerce system optimized for network delivered services , 1995, Digest of Papers. COMPCON'95. Technologies for the Information Superhighway.

[5]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[6]  D SchlichtingRichard,et al.  Preserving and using context information in interprocess communication , 1989 .

[7]  J. Doug Tygar,et al.  Atomicity in electronic commerce , 1996, NTWK.

[8]  Bruce Schneier "E-mail Security - How to keep your Electronic Messages Private": E-mail security by Bruce Schneier 1995 (John Wiley & Sons 365 pp.) isbn 0-471-05318-X , 1995, Comput. Law Secur. Rev..

[9]  Marvin A. Sirbu,et al.  NetBill: an Internet commerce system optimized for network-delivered services , 1995, IEEE Wirel. Commun..

[10]  V. Hardman Author Information , 2021, Disability and Health Journal.

[11]  Michael K. Reiter,et al.  Securing Causal Relationships in Distributed Systems , 1995, Comput. J..

[12]  Bruce S. Davie,et al.  Computer Networks: A Systems Approach , 1996 .

[13]  Andreas Reuter,et al.  Transaction Processing: Concepts and Techniques , 1992 .

[14]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[15]  Robbert van Renesse,et al.  Reliable Distributed Computing with the Isis Toolkit , 1994 .

[16]  Richard D. Schlichting,et al.  Preserving and using context information in interprocess communication , 1989, TOCS.

[17]  Sean W. Smith,et al.  Signed Vector Timestamps: A Secure Protocol for Partial Order Time , 1993 .