SlideShare a Scribd company logo
Fair and Abuse-free Contract Signing 
Protocol Supporting Fair License 
Reselling 
By 
Tarek Gaber 
PhD Candidate: School of Computer Science 
The University of Manchester, Manchester, UK 
4th IFIP International Conference on New Technologies, Mobility and 
4th IFIP International Conference on New Technologies, Mobility and 
Security (NTMS), 7 - 10 February 2011 in Paris - Fran1ce 
Security (NTMS), 7 - 10 February 2011 in Paris - France
Introduction 
 DRM (Digital Rights Management): 
 Content owners 
 Consumers 
25/10/14 
 Persistent protection 
 Prevent unauthorized access 
 Managing usage rights (i.e. license) 
 E.g. expiration date, device restriction, etc. 
 Protect their monetary interests 
 Purchase licenses (from a License issuer (LI)) 
to access corresponding digital contents. 
 But can NOT resell their licenses 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
Reselling Deal (RD) Method[1] 
RD 
Pre-official RD 
Official-RD 
Send Alice’s license to Bob 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee 
Reseller 
(Alice) 
Buyer 
(Bob) 
1- Negotiation 
•Agree on deal terms and conditions` 
2- Signing 
•Commit to RD terms and conditions 
3- Submission 
•Submit a signed RD 
•Make payment 
License 
Issuer 
(LI) 
4- Activation 
•Revoke Alice’s license 
•Send Bob’s payment to Alice 
• 
RD done 
Handling Misbehaviour of Alice 
•Prevent further reselling: Blacklist 
•Impose a charge 
[1] T. Gaber and N. Zhang 2010
Current Contract Signing Protocols 
 Introduction 
 Gradual-release protocols 
 Optimistic contract signing 
25/10/14 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
Introduction: Contract Signing Protocol 
 Use digital signatures to sign a contract over 
a network (the Internet ) 
 Special type of fair exchange protocols 
 Important for electronic commerce 
 Example: Naive Two-party protocol: 
Alice ® Bob : SignA (contract) 
Bob ® Alice : SignB (contract) 
25/10/14 5
Introduction: Contract Signing Protocol 
 Problems: 
 Not fair: Bob has got Alice’s signature but Alice 
has not 
 Abuse: Bob gain some advantage by showing to 
Charlie that Bob has indeed signed the contract 
and he is in control of the protocol outcome 
Alice ® Bob : SignA (contract) 
Bob ® Alice : 
Not-fair 
NSiogtnhing A (contract) 
Alice ® Bob : SignA (contract) 
Bob ® Alice : Nothing or SignB (contract) 
Non-abuse-free 
25/10/14 6
Properties of Contract Signing 
 Fairness 
 If A can get B’s signature, then B can get A’s 
signature and vice-versa 
 Non-repudiation 
 No signer can deny having participated in the 
protocol 
 Abuse-freeness (provable advantage) 
 No signer can prove to an external party that he 
has the power to choose the outcome of the 
protocol (terminate or successfully complete the 
protocol) 
25/10/14 7
Gradual-release Protocols 
 Dividing signatures to N verifiable parts 
 Exchanging the signatures part-by-part 
 Disadvantages 
 Not practical 
 Involved entities should have equal computational 
power 
 Inefficient 
 Many messages flows 
 High computational cost 
 Make each part verifiable 
 Prove that each part is correct 
Can we adopt one of the Gradual-release Protocols to sign the RD? 
25/10/14 8
Optimistic Contract Signing (1 of 3) 
 Signers (A and B) optimistically sign 
a contract themselves 
A 
SignA(A, [contract, hash(NonceA)] ) 
SignB(B, [contract, hash(NonceB)] ) 
NonceA 
NonceB 
B 
SignSign A(A, [contract, NonceA] ) B(B, [contract, NonceB] ) 
25/10/14 9
Optimistic Contract Signing (2 of 3) 
 If there is a problem, a TTP is only 
involved (e.g. A does not send M3) 
A 
M1:SignA(A, [contract, hash(NonceA)] ) 
M2:Sign(B, [contract, hash(NonceB)] ) 
B 
TTP 
M1 +M2 
Signed Contract 
M3: XXX 
Signed Contract 
25/10/14 10
Optimistic Contract Singing (3 of 3) 
 TTP is only involved if there is a problem 
 Disadvantages 
 Performance bottleneck 
 Decrease efficiency 
 Increase transaction cost 
 Difficult to find 
Can we adopt one of the current optimistic protocols to sign the RD? 
25/10/14 
 Number of Message flow between TTP and signers 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee 
[2] Zhang, Wen, and Chen, 2008
TTP and Reselling Deal (RD) Method[1] 
25/10/14 
RD 
Pre-official RD 
Official-RD 
Send Alice’s license to Bob 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee 
Reseller 
(Alice) 
Buyer 
(Bob) 
1- Negotiation 
•Agree on deal terms and conditions` 
2- Signing 
•Commit to RD terms and conditions 
3- Submission 
•Submit a signed RD 
•Make payment 
License 
Issuer 
(LI) 
4- Activation 
•Revoke Alice’s license 
•Send Bob’s payment to Alice 
• 
RD done 
Handling Misbehaviour of Alice 
•Prevent further reselling: Blacklist 
•Impose a charge 
TTP 
[1] T. Gaber and N. Zhang 2010 
TTP 
Increasing 
LI’s workload
Concurrent Signatures (CS) Scheme[3] 
 A digital signature scheme: 
 Non-binding or ambiguous signatures 
exchange, and 
 Releasing secret key called a keystone 
 Concurrently full binding signatures 
 Either the two exchanged signatures become 
binding, or none becomes. 
 Advantages: 
 No TTP 
 No equivalent computational power 
25/10/14 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee 
[3] Chen, Kudla, and Paterson, 2004
CS Scheme Problems 
25/10/14 
Bob 
4- Verifies 
ASignB (RD) 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee 
2- Verifies 
ASignA (RD) 
1- ASign A (RD) 
e-Book 
Alice 
3- ASign B (RD) 
5-Keystone Ks 
Ks, 
f=H 
(Ks) 
Where: 
ASign is Ambiguous Signature 
Ks is the Keystone 
Only Alice controls the 
releasing of the keystone 
Ks. So, she can abuse 
Bob’s signature and/or 
compromise the fairness 
X
CS and our Protocol 
 Can we utilize the CS advantages (i.e. 
no TTP, and no restriction of 
computational power) and overcome its 
problems? 
25/10/14 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
Fair and Abuse-free Contract Signing Protocol 
Supporting Fair License Reselling* 
 Design considerations of the RDS protocol: 
 Fairness 
 Either both signers get a signed contract or none gets 
anything useful 
 Abuse-freeness 
 Inability to prove to an outside entity that a signer is able 
to control the output of a protocol. 
 Non-repudiation 
 No party could deny having generated his signature 
(NOO: Non-repudiation of Origin) 
 No party could deny having received a signature from the 
other signer (NOR: Non-repudiation of Receipt) 
 No dedicated TTP 
* Here after, it will be called Reselling Deal Signing (RDS) Protocol 
25/10/14 16 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
RDS Protocol Assumptions 
 License Issuer (LI) 
 Trustworthy, issues licenses, and facilitates license 
reselling. It is already there in existing license 
distribution infrastructure 
 Reselling Permission of a license (R PLic) 
 It is issued with a resalable license 
 It is of the from [Lic||f||SignLI(Lic||f)], where f is the 
hash value of the keystone ks 
 Each license is issued with a unique ks 
 Channels are resilient, authenticated, and 
protected 
 Each entity has got a public/private key pair 
25/10/14 17 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
RDS Protocol Description 
A B 
Msg1= {RD||ASignA(RD)||RPLic } 
Msg {RD ||ASign (RD )} 2 = ASignA B ASignA 
Msg3 { f || E (ks)} = PKB 
RDASignA (RD|| ASignA (RD)) = 
Bv1 and Bv2 
Av1 and Av2 
Bv3 
After successful verification, 
Alice gets signed RD: 
After Msg1, Bob gets: 
After successful verification, 
RDS Protocol Verifications: Bob gets signed RD 
Bv1: Checking the correctness of RPi.e. Verifying Sign(Lic||f) 
Lic 
LIBv2: Checking the correctness h A 
+ f = H2(of g s 
ASignA PK h 
A 
f A 
(RD) 
PK B 
( mod p)||RD) ( mod q)? 
ABv3:Confirming that H(ks) equals H(f ks) which = was f in RPprovided ? 
Licin RP1Lic 
Av1:Confirming that the same f is used in both ASignand ASignA B 
Av1:Checking the correctness of ASignB 
25/10/14 18 
h f H2(g B PK B 
PK ( mod p)||RD ASign 
) ( mod q)? A 
f 
A 
h 
B 
s 
B + = 
f in ASignA= f in ASignB?
RDS Protocol: Step 1 
RD 
Unsigned RD Ambiguously signed RD 
25/10/14 
ASIGN algorithm 
Step 1: Alice ambiguously signs the RD, 
she then sends it to Bob 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee 
RD 
ASignA(RD) 
ƒ=H(ks), PKA,SKA , PKB 
with Alice
RDS Protocol : Step 2 
RD 
ASignA(RD) 
25/10/14 
PKA, PKB 
AVERIFY algorithm 
Step 2.1: Bob verifies ASignA(RD) 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee 
Accept: 
Generate his ambiguous signature 
Reject: 
Terminate the protocol 
Ambiguously signed RD 
with Alice
RDS Protocol: Step 2 (Cont.) 
RD 
ASignA(RD) 
= ASignA RD 
25/10/14 
ASIGN algorithm 
ƒ=H(ks), PKB, SKB , PKA 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee 
ASignB( ) AARRDD iiggnnSSAA 
The RD Ambiguously Signed 
with Alice and Bob 
The RD ambiguously signed 
with Alice 
Step 2.2: Bob ambiguously signs the RD ambiguously signed by Alice, 
he then sends it to Alice again
RDS Protocol: Step 3 
PKA, PKB 
ASignA RD 
Step 3: Alice verifies ASign( RD BASignA 
), if the result is positive, Alice sends Bob 
ks which makes the two ambiguous signatures, ASign(RD), ASign( ), 
ABbinding to Alice and Bob respectively 
At this step, both Alice and Bob will have a signed RD bound to both of them 
25/10/14 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee 
RD ASignA 
AVERIFY algorithm 
Accept: 
Send ks to Bob 
Reject: 
Terminate the protocol 
ASignB( ) ASignA RD 
The RD Ambiguously Signed 
with Alice and Bob
LI’s Role in the RDS protocol (1 of 2) 
 NOT involved in the RDS protocol itself 
 ONLY involved during the reselling process. 
 In case, ks is not released during RDS and Bob 
sends LI an RD activation request (i.e. initiating 
the reselling process), LI sends Bob the license 
Lic and the ks. 
25/10/14 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
LI’s Role in the RDS protocol (2 of 2) 
Submitted RD 
Buyer’s signature is valid 
Reseller's signature is valid 
25/10/14 
LIV1 
No buyer’s signature or it is not valid 
No reseller’s signature or it is not valid 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee 
No payment 
Payment is provided 
LIV2 
LIV3.1 
LIV3.2 
LIV4 
Stop 
and 
terminate 
the 
protocol 
run 
Payment is enough 
Payment is not enough 
Non-resalable (i.e. ks is not valid) 
Resalable 
Resold (i.e. ks is already released) 
Not resold yet 
LIV5 
Accept 
and activate the submitted RD 
Legitimacy check
RDS Protocol Analysis (1 of 3) 
 Fairness 
 Alice and Bob behave properly 
 Fairness is achieved 
 Alice behaves improperly 
 Not sending Msg3 to Bob 
 Sending Bob wrong ks in Msg3 
 Sending an incomplete RD activation request to LI 
 Bob behaves improperly 
 Not sending Msg2 
 Sending an incomplete RD activation request to LI 
25/10/14 25 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee 
Bob can send LI an 
RD activation request 
without ks 
Rejecte 
Nothing to d 
gain 
Rejecte 
d
RDS Protocol Analysis (2 of 3 ) 
 Non-Repudiation 
 NOO of the signatures is achieved when: 
 Ks is released either by Alice or by LI 
 NOR of the signatures 
 Receiving Msg2 means that Alice has got NOR of 
ASignA 
 Receiving Msg3 (i.e. ks) means that Bob has got NOR 
of ASignB 
 Msg2 is not sent to Alice and Bob has sent LI an RD 
activation request, Alice and Bob will receive ASignB 
(NOR of ASignA) and ks (NOR of ASignB), respectively 
25/10/14 26 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
RDS Protocol Analysis (3 of 3) 
 Abuse-Free 
 Bob can not abuse ASignA 
 ASignA is ambiguous 
 Alice can not abuse ASignB 
 ASignB consists of ASignA, this means that if Bob 
is binding to the RD then Alice is also binding to 
it 
(i.e. the protocol outcome has already been 
determined ) 
25/10/14 27 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
Contribution and Future Work 
 To support fair license reselling, RDS protocol has been 
designed without using a dedicated TTP, thus reducing 
an additional computational cost. 
 The CS scheme and the current license distribution 
infrastructure (LI) has been integrated to achieve the 
RDS protocol properties. 
 The RDS protocol provides fairness, abuse-freeness and 
non-repudiation 
 The RDS protocol could be used in reselling both a digital 
license and an access permission 
 We are going to formally verify the RDS protocol 
25/10/14 28 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
Thanks 
Questions 
25/10/14 29 
NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee

More Related Content

Viewers also liked

Propuesta de Educación Sexual Para La Educación Primaria
Propuesta de Educación Sexual Para La Educación PrimariaPropuesta de Educación Sexual Para La Educación Primaria
Propuesta de Educación Sexual Para La Educación Primariasilmaxmacre
 
Master of Ceremony Script
Master of Ceremony ScriptMaster of Ceremony Script
Master of Ceremony ScriptBella Meraki
 
Enfermedades de trasmisión sexual
Enfermedades de trasmisión sexualEnfermedades de trasmisión sexual
Enfermedades de trasmisión sexualDavidCtrp
 
Desarrollo humano (énfasis femenino)
Desarrollo humano (énfasis femenino)Desarrollo humano (énfasis femenino)
Desarrollo humano (énfasis femenino)Mariaisa Apellidos
 
Educacion Sexual Para NiñOs
Educacion Sexual Para NiñOsEducacion Sexual Para NiñOs
Educacion Sexual Para NiñOsjosejuan6a
 

Viewers also liked (10)

Propuesta de Educación Sexual Para La Educación Primaria
Propuesta de Educación Sexual Para La Educación PrimariaPropuesta de Educación Sexual Para La Educación Primaria
Propuesta de Educación Sexual Para La Educación Primaria
 
Ciclos de vida
Ciclos de vidaCiclos de vida
Ciclos de vida
 
Ciclo vital
Ciclo vitalCiclo vital
Ciclo vital
 
A). ciclo vital humano
A).  ciclo vital humanoA).  ciclo vital humano
A). ciclo vital humano
 
Master of Ceremony Script
Master of Ceremony ScriptMaster of Ceremony Script
Master of Ceremony Script
 
Los ciclos de vida.
Los ciclos de vida.Los ciclos de vida.
Los ciclos de vida.
 
Emcee Script
Emcee ScriptEmcee Script
Emcee Script
 
Enfermedades de trasmisión sexual
Enfermedades de trasmisión sexualEnfermedades de trasmisión sexual
Enfermedades de trasmisión sexual
 
Desarrollo humano (énfasis femenino)
Desarrollo humano (énfasis femenino)Desarrollo humano (énfasis femenino)
Desarrollo humano (énfasis femenino)
 
Educacion Sexual Para NiñOs
Educacion Sexual Para NiñOsEducacion Sexual Para NiñOs
Educacion Sexual Para NiñOs
 

More from Tarek Gaber

Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Tarek Gaber
 
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Tarek Gaber
 
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionThermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionTarek Gaber
 
Using Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectUsing Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectTarek Gaber
 
Brief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisBrief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisTarek Gaber
 
Simple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberSimple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberTarek Gaber
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberTarek Gaber
 
Integer Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationInteger Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationTarek Gaber
 
Segmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareSegmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareTarek Gaber
 
Touch paper presentation-tarek
Touch paper presentation-tarekTouch paper presentation-tarek
Touch paper presentation-tarekTarek Gaber
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Tarek Gaber
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberTarek Gaber
 
A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...Tarek Gaber
 
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014Tarek Gaber
 

More from Tarek Gaber (15)

Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)
 
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
 
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionThermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
 
Using Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectUsing Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation project
 
Brief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisBrief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project Thesis
 
Simple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberSimple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_Gaber
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
 
Integer Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationInteger Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image Authentication
 
Segmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareSegmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid share
 
Touch paper presentation-tarek
Touch paper presentation-tarekTouch paper presentation-tarek
Touch paper presentation-tarek
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaber
 
A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...
 
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
Intelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdfIntelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdfAnthony Lucente
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Boni Yeamin
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Server-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at PricelineServer-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at PricelineUXDXConf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Intelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdfIntelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdf
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Server-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at PricelineServer-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at Priceline
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 

Fair and abuse free contract signing protocol supporting fair license reselling-ntms2011-paris-france-tarek gaber

  • 1. Fair and Abuse-free Contract Signing Protocol Supporting Fair License Reselling By Tarek Gaber PhD Candidate: School of Computer Science The University of Manchester, Manchester, UK 4th IFIP International Conference on New Technologies, Mobility and 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 7 - 10 February 2011 in Paris - Fran1ce Security (NTMS), 7 - 10 February 2011 in Paris - France
  • 2. Introduction  DRM (Digital Rights Management):  Content owners  Consumers 25/10/14  Persistent protection  Prevent unauthorized access  Managing usage rights (i.e. license)  E.g. expiration date, device restriction, etc.  Protect their monetary interests  Purchase licenses (from a License issuer (LI)) to access corresponding digital contents.  But can NOT resell their licenses NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
  • 3. Reselling Deal (RD) Method[1] RD Pre-official RD Official-RD Send Alice’s license to Bob NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee Reseller (Alice) Buyer (Bob) 1- Negotiation •Agree on deal terms and conditions` 2- Signing •Commit to RD terms and conditions 3- Submission •Submit a signed RD •Make payment License Issuer (LI) 4- Activation •Revoke Alice’s license •Send Bob’s payment to Alice • RD done Handling Misbehaviour of Alice •Prevent further reselling: Blacklist •Impose a charge [1] T. Gaber and N. Zhang 2010
  • 4. Current Contract Signing Protocols  Introduction  Gradual-release protocols  Optimistic contract signing 25/10/14 NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
  • 5. Introduction: Contract Signing Protocol  Use digital signatures to sign a contract over a network (the Internet )  Special type of fair exchange protocols  Important for electronic commerce  Example: Naive Two-party protocol: Alice ® Bob : SignA (contract) Bob ® Alice : SignB (contract) 25/10/14 5
  • 6. Introduction: Contract Signing Protocol  Problems:  Not fair: Bob has got Alice’s signature but Alice has not  Abuse: Bob gain some advantage by showing to Charlie that Bob has indeed signed the contract and he is in control of the protocol outcome Alice ® Bob : SignA (contract) Bob ® Alice : Not-fair NSiogtnhing A (contract) Alice ® Bob : SignA (contract) Bob ® Alice : Nothing or SignB (contract) Non-abuse-free 25/10/14 6
  • 7. Properties of Contract Signing  Fairness  If A can get B’s signature, then B can get A’s signature and vice-versa  Non-repudiation  No signer can deny having participated in the protocol  Abuse-freeness (provable advantage)  No signer can prove to an external party that he has the power to choose the outcome of the protocol (terminate or successfully complete the protocol) 25/10/14 7
  • 8. Gradual-release Protocols  Dividing signatures to N verifiable parts  Exchanging the signatures part-by-part  Disadvantages  Not practical  Involved entities should have equal computational power  Inefficient  Many messages flows  High computational cost  Make each part verifiable  Prove that each part is correct Can we adopt one of the Gradual-release Protocols to sign the RD? 25/10/14 8
  • 9. Optimistic Contract Signing (1 of 3)  Signers (A and B) optimistically sign a contract themselves A SignA(A, [contract, hash(NonceA)] ) SignB(B, [contract, hash(NonceB)] ) NonceA NonceB B SignSign A(A, [contract, NonceA] ) B(B, [contract, NonceB] ) 25/10/14 9
  • 10. Optimistic Contract Signing (2 of 3)  If there is a problem, a TTP is only involved (e.g. A does not send M3) A M1:SignA(A, [contract, hash(NonceA)] ) M2:Sign(B, [contract, hash(NonceB)] ) B TTP M1 +M2 Signed Contract M3: XXX Signed Contract 25/10/14 10
  • 11. Optimistic Contract Singing (3 of 3)  TTP is only involved if there is a problem  Disadvantages  Performance bottleneck  Decrease efficiency  Increase transaction cost  Difficult to find Can we adopt one of the current optimistic protocols to sign the RD? 25/10/14  Number of Message flow between TTP and signers NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee [2] Zhang, Wen, and Chen, 2008
  • 12. TTP and Reselling Deal (RD) Method[1] 25/10/14 RD Pre-official RD Official-RD Send Alice’s license to Bob NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee Reseller (Alice) Buyer (Bob) 1- Negotiation •Agree on deal terms and conditions` 2- Signing •Commit to RD terms and conditions 3- Submission •Submit a signed RD •Make payment License Issuer (LI) 4- Activation •Revoke Alice’s license •Send Bob’s payment to Alice • RD done Handling Misbehaviour of Alice •Prevent further reselling: Blacklist •Impose a charge TTP [1] T. Gaber and N. Zhang 2010 TTP Increasing LI’s workload
  • 13. Concurrent Signatures (CS) Scheme[3]  A digital signature scheme:  Non-binding or ambiguous signatures exchange, and  Releasing secret key called a keystone  Concurrently full binding signatures  Either the two exchanged signatures become binding, or none becomes.  Advantages:  No TTP  No equivalent computational power 25/10/14 NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee [3] Chen, Kudla, and Paterson, 2004
  • 14. CS Scheme Problems 25/10/14 Bob 4- Verifies ASignB (RD) NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee 2- Verifies ASignA (RD) 1- ASign A (RD) e-Book Alice 3- ASign B (RD) 5-Keystone Ks Ks, f=H (Ks) Where: ASign is Ambiguous Signature Ks is the Keystone Only Alice controls the releasing of the keystone Ks. So, she can abuse Bob’s signature and/or compromise the fairness X
  • 15. CS and our Protocol  Can we utilize the CS advantages (i.e. no TTP, and no restriction of computational power) and overcome its problems? 25/10/14 NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
  • 16. Fair and Abuse-free Contract Signing Protocol Supporting Fair License Reselling*  Design considerations of the RDS protocol:  Fairness  Either both signers get a signed contract or none gets anything useful  Abuse-freeness  Inability to prove to an outside entity that a signer is able to control the output of a protocol.  Non-repudiation  No party could deny having generated his signature (NOO: Non-repudiation of Origin)  No party could deny having received a signature from the other signer (NOR: Non-repudiation of Receipt)  No dedicated TTP * Here after, it will be called Reselling Deal Signing (RDS) Protocol 25/10/14 16 NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
  • 17. RDS Protocol Assumptions  License Issuer (LI)  Trustworthy, issues licenses, and facilitates license reselling. It is already there in existing license distribution infrastructure  Reselling Permission of a license (R PLic)  It is issued with a resalable license  It is of the from [Lic||f||SignLI(Lic||f)], where f is the hash value of the keystone ks  Each license is issued with a unique ks  Channels are resilient, authenticated, and protected  Each entity has got a public/private key pair 25/10/14 17 NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
  • 18. RDS Protocol Description A B Msg1= {RD||ASignA(RD)||RPLic } Msg {RD ||ASign (RD )} 2 = ASignA B ASignA Msg3 { f || E (ks)} = PKB RDASignA (RD|| ASignA (RD)) = Bv1 and Bv2 Av1 and Av2 Bv3 After successful verification, Alice gets signed RD: After Msg1, Bob gets: After successful verification, RDS Protocol Verifications: Bob gets signed RD Bv1: Checking the correctness of RPi.e. Verifying Sign(Lic||f) Lic LIBv2: Checking the correctness h A + f = H2(of g s ASignA PK h A f A (RD) PK B ( mod p)||RD) ( mod q)? ABv3:Confirming that H(ks) equals H(f ks) which = was f in RPprovided ? Licin RP1Lic Av1:Confirming that the same f is used in both ASignand ASignA B Av1:Checking the correctness of ASignB 25/10/14 18 h f H2(g B PK B PK ( mod p)||RD ASign ) ( mod q)? A f A h B s B + = f in ASignA= f in ASignB?
  • 19. RDS Protocol: Step 1 RD Unsigned RD Ambiguously signed RD 25/10/14 ASIGN algorithm Step 1: Alice ambiguously signs the RD, she then sends it to Bob NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee RD ASignA(RD) ƒ=H(ks), PKA,SKA , PKB with Alice
  • 20. RDS Protocol : Step 2 RD ASignA(RD) 25/10/14 PKA, PKB AVERIFY algorithm Step 2.1: Bob verifies ASignA(RD) NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee Accept: Generate his ambiguous signature Reject: Terminate the protocol Ambiguously signed RD with Alice
  • 21. RDS Protocol: Step 2 (Cont.) RD ASignA(RD) = ASignA RD 25/10/14 ASIGN algorithm ƒ=H(ks), PKB, SKB , PKA NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee ASignB( ) AARRDD iiggnnSSAA The RD Ambiguously Signed with Alice and Bob The RD ambiguously signed with Alice Step 2.2: Bob ambiguously signs the RD ambiguously signed by Alice, he then sends it to Alice again
  • 22. RDS Protocol: Step 3 PKA, PKB ASignA RD Step 3: Alice verifies ASign( RD BASignA ), if the result is positive, Alice sends Bob ks which makes the two ambiguous signatures, ASign(RD), ASign( ), ABbinding to Alice and Bob respectively At this step, both Alice and Bob will have a signed RD bound to both of them 25/10/14 NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee RD ASignA AVERIFY algorithm Accept: Send ks to Bob Reject: Terminate the protocol ASignB( ) ASignA RD The RD Ambiguously Signed with Alice and Bob
  • 23. LI’s Role in the RDS protocol (1 of 2)  NOT involved in the RDS protocol itself  ONLY involved during the reselling process.  In case, ks is not released during RDS and Bob sends LI an RD activation request (i.e. initiating the reselling process), LI sends Bob the license Lic and the ks. 25/10/14 NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
  • 24. LI’s Role in the RDS protocol (2 of 2) Submitted RD Buyer’s signature is valid Reseller's signature is valid 25/10/14 LIV1 No buyer’s signature or it is not valid No reseller’s signature or it is not valid NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee No payment Payment is provided LIV2 LIV3.1 LIV3.2 LIV4 Stop and terminate the protocol run Payment is enough Payment is not enough Non-resalable (i.e. ks is not valid) Resalable Resold (i.e. ks is already released) Not resold yet LIV5 Accept and activate the submitted RD Legitimacy check
  • 25. RDS Protocol Analysis (1 of 3)  Fairness  Alice and Bob behave properly  Fairness is achieved  Alice behaves improperly  Not sending Msg3 to Bob  Sending Bob wrong ks in Msg3  Sending an incomplete RD activation request to LI  Bob behaves improperly  Not sending Msg2  Sending an incomplete RD activation request to LI 25/10/14 25 NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee Bob can send LI an RD activation request without ks Rejecte Nothing to d gain Rejecte d
  • 26. RDS Protocol Analysis (2 of 3 )  Non-Repudiation  NOO of the signatures is achieved when:  Ks is released either by Alice or by LI  NOR of the signatures  Receiving Msg2 means that Alice has got NOR of ASignA  Receiving Msg3 (i.e. ks) means that Bob has got NOR of ASignB  Msg2 is not sent to Alice and Bob has sent LI an RD activation request, Alice and Bob will receive ASignB (NOR of ASignA) and ks (NOR of ASignB), respectively 25/10/14 26 NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
  • 27. RDS Protocol Analysis (3 of 3)  Abuse-Free  Bob can not abuse ASignA  ASignA is ambiguous  Alice can not abuse ASignB  ASignB consists of ASignA, this means that if Bob is binding to the RD then Alice is also binding to it (i.e. the protocol outcome has already been determined ) 25/10/14 27 NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
  • 28. Contribution and Future Work  To support fair license reselling, RDS protocol has been designed without using a dedicated TTP, thus reducing an additional computational cost.  The CS scheme and the current license distribution infrastructure (LI) has been integrated to achieve the RDS protocol properties.  The RDS protocol provides fairness, abuse-freeness and non-repudiation  The RDS protocol could be used in reselling both a digital license and an access permission  We are going to formally verify the RDS protocol 25/10/14 28 NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee
  • 29. Thanks Questions 25/10/14 29 NTMS’11, 7 - 10 February NTMS’11, 7 - 10 February 22001111,, PPaarrisis - - F Frraannccee

Editor's Notes

  1. Good afternoon everyone, thanks for your coming. I am Tarek Gaber, a PhD student under the Supervision of Dr. Ning Zhang Today, I am going to give a talk about “ Contract Signing Protocol that supports fair License Reselling”.
  2. Nowadays, most of us may have noticed some restrictions on the use of digital contents (such as Movies and Music, eBook ). These restrictions could be on device (use the content on one or two devices), on the platform (content to be used on Windows or Unix only). These restrictions are applied by a technology called DRM. This technology allows content owners to provide persistent protection to their content. So, preventing unauthorised access to the content. The DRM also allows the owner to manage usage rights (such as expiration date, device restriction ) over the content. This DRM enables owner to protect their monetary interests by only allowing consumers to access a digital content if they pay for the corresponding licenses . However, those consumers are not allowed to resell the licenses they have purchased
  3. To allow a consumer to resell his license, we have designed a method called a Reselling Deal (RD) method. This method allows a reseller (Alice) to resell her license to a buyer (Bob). In the first step of this method, A and B negotiate a contract called RD. They then sign this RD. The output of this the signing process is a token called Pre-official RD. we have called it by this name as it is not yet approved by LI. To activate this Pre-official RD, Bob (the buyer) submits it along the agreed payment to LI. After this process, LI can declare that the RD is Official and then revokes Alice’s license and sends her Bob’s payment and also sends Bob Alice’s license. If for example, Alice refused to revoke her license after Bob has paid to LI, LI can either put Alice in a blacklist to prevent her from reselling any other licenses in the future, or impose a charge on Alice )……. In this presentation we will only focus on how Alice and Bob sign the RD. To sign this RD, we either adopt one of the existing protocols or design a new one.
  4. Lets first, explain what is the contract signing protocol. A contract Singing is a special kind of fair exchange protocols. It uses digital signature to sign a contract over the internet. It is also a very important issue for E-Commerce. To show how a signing protocol work, consider the following example.
  5. In this simple example, we have two problems. First, Bob could receive Alice’s signature put does not send his signature to Alice which is not fair fro Alice. In the second one, once Bob has got Alice’s signature, he could prove to Charlie that he is in control of the outcome of the protocol so he, for example, can coerce Charlie to sign a better contract. This problem is called signature abusing.
  6. From these simple, example and it problems, we can summarize the main requirements of a contract signing protocol.
  7. In this approach, two parties first agree on dividing their signatures to N verifiable parts. And then, Because of these limitations, we can not use any of these protocol to sign the RD-contract in a reselling process. The answer is NO. This is because in the context of reselling license , it is very difficult to restrict the level of the computational power of the reseller and the buyer
  8. By the end of the signing process, Alice should receive a contact on the this form and Bob on this form ………….. To do so, Alice first hashes her NONCE and Bob does the same and then they exchange the plain NONCES .
  9. In case of a problem such as network failure or Alice misbehaving, TTP is involved to sort out this problem by send a signed contract
  10. The answer is NO. This is because, if for example, one of the recent TTP based protocol is used, in our case, a fourth entity will be added to the license reselling process, making it inefficient.
  11. If LI is used a TTP in the signing process, an additional workload will be added to LI which would make LI a performance bottleneck. Recently, a cryptographic primitive called CS scheme has been introduced.
  12. , Recently, a promising scheme called CS, is introduced. It allows two entities to exchange two ambiguous signatures. One entity then release an extra information called keystone which makes the exchanged signatures binding to their relative signers. So, either there are binding signatures or there is not
  13. Inability to prove to an outside entity that she/he is able to control the output of a protocol.
  14. Inability to prove to an outside entity that she/he is able to control the output of a protocol.
  15. This is the formal message of the protocol, next I will describe it in informal way.