{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T15:47:39Z","timestamp":1725464859231},"publisher-location":"Boston","reference-count":27,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"1402081545"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/1-4020-8155-3_13","type":"book-chapter","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T22:56:17Z","timestamp":1147128977000},"page":"227-245","source":"Crossref","is-referenced-by-count":6,"title":["Fair Payment Protocols for E-Commerce"],"prefix":"10.1007","author":[{"given":"Hao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Heqing","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"N. Asokan, Philippe A. Janson, Michael Steiner, and Michael Waidner, \u201cThe State of the Art in Electronic Payment Systems\u201d, IEEE Computer, September 1997, pp. 28\u201335.","DOI":"10.1109\/2.612244"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"N. Asokan, M. Schunter, and M. Waidner, \u201cOptimistic protocols for fair exchange\u201d, in Proceedings of the fourh ACM Conference on Computer and Communications Security, Zurich, Switzerland, April 1997, pp. 6, 8\u201317.","DOI":"10.1145\/266420.266426"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"N. Asokan and V. Shoup, \u201cOptimistic fair exchange of digital signatures\u201d, in Advances in Cryptology-EUROCRYPT\u2019 98, volume 1403 of Lecture Notes in Computer Science, Springer-Verlag, 1998, pp. 591\u2013606.","DOI":"10.1007\/BFb0054156"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"N. Asokan, V. Shoup, and M. Waidner, \u201cAsynchronous protocols for optimistic fair exchange\u201d, in Proceedings of IEEE Symposium on Research in Security and Privacy, 1998, pp. 86\u201399. (Printed version contains some errors. Errata sheet is distributed together with the electronic version).","DOI":"10.1109\/SECPRI.1998.674826"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"G. Ateniese, \u201cEfficient verifiable encryption (and fair exchange) of digital signatures\u201d, in Proceedings of the 6th ACM conference on Computer and communications security, Nov. 1999.","DOI":"10.1145\/319709.319728"},{"key":"13_CR6","unstructured":"F. Bao, R. Deng and W. Mao, \u201cEfficient and practical fair exchange protocols with offline TTP\u201d, in Proceedings of IEEE Symposium on Security and Privacy, Oakland, May 1998, pp. 77\u201385."},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"C. Boyd, E. Foo. \u201cOff-line Fair Payment Protocols using Convertible Signatures\u201d, in Advances in Cryptology-ASIA CRYPT\u201998, 1998.","DOI":"10.1007\/3-540-49649-1_22"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/978-3-540-45187-7_24","volume":"2761","author":"R. Chadha","year":"2003","unstructured":"R. Chadha, J. Mitchell, A. Scedrov and V. Shmatikov, \u201cContract signing, optimism and advantage\u201d, in CONCUR 2003-Concurrency Theory, 14-th International Conference, Marseille, France, September 2003. Volume 2761 of Lecture Notes in Computer Science, Springer-Verlag, 2003, pp. 366\u2013382","journal-title":"Lecture Notes in Computer Science"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"R. Chadha, M. Kanovich and A. Scedrov, \u201cInductive methods and contract-signing protocols\u201d, in Proceedings of 8th ACM confererence on Computer and Communications Security(CCS-8). Philadelphia, Pennsylvania, ACM Press, November 7, 2001, pp. 176\u2013185.","DOI":"10.1145\/501983.502008"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Y. Dodis and L. Reyzin, \u201cBreaking and repairing optimistic fair exchange from PODC 2003\u201d, in Proceedings of the 2003 ACM workshop on Digital rights management, Oct. 2003.","DOI":"10.1145\/947380.947387"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"J. Garay, M. Jakobsson and P. MacKenzie. \u201cAbuse-free optimistic contract signing\u201d, in Advances in Cryptology-CRYPTO\u2019 99, volume 1666 of Lecture Notes in Computer Science, SpringerVerlag, 1999, pp. 449\u2013466.","DOI":"10.1007\/3-540-48405-1_29"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"S. Gurgens, C. Rudolph and H. Vogt, \u201cOn the Security of Fair Non-repudiation Protocols\u201d, in Proceedings of 2003 Information Security Conference, volume 2851 of Lecture Notes in Computer Science, Bristol, UK, Oct. 2003, pp. 193\u2013207.","DOI":"10.1007\/10958513_15"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"M. Jakobsson, K. Sako, R. Impagliazzo, \u201cDesignated verifier proofs and their applications\u201d, in Eurocrypt\u201996, volume 1070 of Lecture Notes in Computer Science, Springer Verlag, 1996, pp. 143\u2013154.","DOI":"10.1007\/3-540-68339-9_13"},{"key":"13_CR14","unstructured":"S. Kremer and O. Markowitch, \u201cOptimistic non-repudiable information exchange\u201d, in 21th Symposium on Information Theory in the Benelux, Werkgemeenschap Informatie-en Communicatietheorie, Enschede, may 2000, pp. 139\u2013146."},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"S. Kremer and J.F. Raskin, \u201cGame Analysis of Abuse-free Contract Signing\u201d, in 15th Computer Security Foundations Workshop (CSFW 2002), IEEE Computer Society. Cape Breton, Nova Scotia, Canada, 2002.","DOI":"10.1109\/CSFW.2002.1021817"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"P. Louridas, \u201cSome guidelines for non-repudiation protocols\u201d, ACM SIGCOMM Computer Communication Review, Oct. 2000.","DOI":"10.1145\/505672.505676"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"O. Markowitch and S. Kremer, \u201cAn optimistic non-repudiation protocol with transparent trusted third party\u201d, in Information Security: ISC 2001, volume 2200 of Lecture Notes in Computer Science, Malaga, Spain. Springer-Verlag, Oct. 2001, pp. 363\u2013378.","DOI":"10.1007\/3-540-45439-X_25"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"O. Markowitch, S. Kremer and D. Gollmann, \u201cOn Fairness in Exchange Protocols\u201d, in Information Security and Cryptology-ICISC 2002, volume 2587 of Lecture Notes in Computer Science. Springer-Verlag, 2002.","DOI":"10.1007\/3-540-36552-4_31"},{"key":"13_CR19","unstructured":"W. Mao and K. Paterson, \u201cConvertible Undeniable Standard RSA Signatures\u201d, 2000; http:\/\/citeseer.ist.psu.edu\/mao00convertible.html ."},{"key":"13_CR20","unstructured":"S. Micali, \u201cCertified e-mail with invisible post offices\u201d, Available from author: an invited presentation at the RSA\u201997 conference, 1997."},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"H. Pagnia, H. Vogt, F.C. Gatner, and U.G. Wilhelm, \u201cSolving Fair Exchange with Mobile Agents\u201d, Volume 1882 of Lecture Notes in Computer science, Springer, September 2000, pp. 57\u201372.","DOI":"10.1007\/978-3-540-45347-5_6"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"J.M. Park, Edwin K. P. Chong and H. J. Siegel, \u201cConstructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures\u201d, in Proceedings of the twenty-second annual symposium on Principles of distributed computing, July 2003.","DOI":"10.1145\/872035.872060"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann, M. Schunter and M. Waidner, \u201cOptimal efficiency of optimistic contract signing\u201d, in Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, June 1998.","DOI":"10.1145\/277697.277717"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"S. Saeednia, S. Kremer and O. Markowitch, \u201cAn efficient strong designated verifier scheme\u201d, in 6th International Conference on Information Security and Cryptology (ICISC 2003), Lecture Notes in Computer Sciences, Springer-Verlag. Seoul, Korea, Nov. 2003.","DOI":"10.1007\/978-3-540-24691-6_4"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"H. Vogt, H. Pagnia, and F.C. Gartner, \u201cModular Fair Exchange Protocols for Electronic Commerce\u201d, In Proceedings of the 15th Annual Computer Security Applications Conference, Phoenix, Arizona. IEEE, Dec. 1999.","DOI":"10.1109\/CSAC.1999.816008"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"C.H. Wang, \u201cUntraceable Fair Network Payment Protocols with Off-Line TTP\u201d, in Advances in Cryptology-ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, volume 2894 of Lecture Notes in Computer Science, Spring-Verlag, 2003, pp. 173\u2013187","DOI":"10.1007\/978-3-540-40061-5_11"},{"key":"13_CR27","unstructured":"G. Wang, \u201cAn Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures\u201d, Cryptology ePrint Archive, Report 2003\/243, 2003; http:\/\/eprint.iacr.org\/2003\/243\/ ."}],"container-title":["IFIP International Federation for Information Processing","Building the E-Service Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8155-3_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:29:00Z","timestamp":1619555340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8155-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["1402081545"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8155-3_13","relation":{},"subject":[]}}