Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures

A fair exchange protocol allows two users to exchange items so that either each user gets the other's item or neither user does. In [2], the verifiable encryption is introduced as a primitive that can be used to build extremely efficient fair exchange protocols where the items exchanged represent digital signatures. Such protocols may be used to digitally sign contracts.
This paper presents new schemes for verifiable encryption of digital signatures. We make use of a trusted third party (TTP) but in an optimistic sense, i.e. the TTP takes part in the protocol only if one user cheats or simply crashes. The performance of our schemes significantly surpass that of prior art.

Keywords: Fair Exchange, Verifiable Encryption, Contract Signing Problem, Public-key Cryptography, Digital Signatures, Proof of Knowledge.

By: Giuseppe Ateniese

Published in: 6th ACM Conference on Computer and Communications Security (CCS '99). , Singapore, ACM, p.138-46 in 1999

Please obtain a copy of this paper from your local library. IBM cannot distribute this paper externally.

Questions about this service can be mailed to reports@us.ibm.com .