SlideShare a Scribd company logo
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1901
www.ijarcet.org

Abstract— With the widespread utilization of e-commerce,
improving fair exchange service becomes an important role in
research area. A cyclic fair exchange protocol for multi party
was proposed by Feng Bao, Robert Deng, Khanh Quoc Nguyen
and Vijay Varadharajan in 1999. According to this protocol, the
user must trust in not only the Trusted Third Party (TTP) but
also the initiator. This paper proposes a modified multi-party
fair exchange protocol that does not depend on the initiator in
order to provide fairness.
Index Terms— e-commerce, cyclic-exchange, multi-party,
fairness, initiator
I. INTRODUCTION
Fairness is one popular research topic in Network Security
area. A protocol can be said as ―fair‖ on condition that after
performing that protocol, all members must have the same
chance and same authority to influence another member.
Assume that two members have their own important
information and each member wants the information from the
other. So each member agrees on one exchange protocol that
he expects to get fairness. After performing this protocol,
receiving respective information and same authority satisfied
each member. Such a protocol is fair exchange protocol.
Fair exchange is usually performed with Trusted Third
Party (TTP).TTP is the third party whom believed by both
parties. Without TTP, the actual fairness cannot be obtained.
Depending on the level of TTP involvement, a protocol can
be described in two types: online-TTP and offline-TTP. With
online-TTP, every exchange step of the protocol must be
noticed by TTP. With offline-TTP, TTP is necessary only
when some unnatural behaviors occur. A protocol can be
idealized to be optimistic if it can delete the involvement of
TTP in the whole exchange process.
Later, researchers tried to gain fairness for more than two
parties. These protocols are named as multi-party fair
exchange (MPFE) protocols. MPFE based on two exchange
methods: Cyclic and General. In Cyclic, the exchange’s
topology is a ring in which each participant Pi offers to
participant Pi+1 message mi in exchange of message mi-1
offered by participant Pi-1 [1]–[4]. In general, each entity can
communicate with the set of entities of his choice [5].
Moreover, the exchanged item may be defined as single unit
Manuscript received May, 2013.
Ms.Nay Chi Htun, Faculty of Information and Communication
Technology, University of Technology (Yatanarpon Cyber City), (Pyin Oo
Lwin, Myanmar
Mrs. Khin Khat Khat Kyaw Faculty of Information and Communication
Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo
Lwin, Myanmar
or multi units. So there are four classes of MPFE: single-unit
cyclic exchange, single-unit general exchange, multi-unit
cyclic exchange and multi-unit general exchange [6].
In this paper, a cyclic fair exchange protocol for
multi-party will be modified and analyzed. In [1], the protocol
is applicable for multi-unit or single-unit cyclic exchange.
Multi- unit general model could also be achieved with some
restrictions. However, participants who agree on the protocol
must trust in both TTP and the initiator to achieve the fairness.
In 2001, N. Gonzalez Deleito and O. Markowitch proposed a
method to cancel the initiator dependence [2]. However, the
communication overhead is dramatically increased because of
many broadcasted messages [3]. In 2011, Yi Liu and Hongli
Hu modified the same protocol to cancel the initiator
dependence with low communication overhead. They use the
equation: f (a). f (b) = f (ab),f (y) =y2
mod N where N is the
product of two prime numbers. There are many possible
number pairs that satisfy above these equations. For example,
f(15).f (16) = f (15.16) where N= 13* 17.So authentication
may be broken down by Dictionary attack. In the proposed
protocol, the participants need to trust only in TTP. The
communication overhead is not high because no message is
broadcasted many times.
The paper is organized as follow. The original protocol
proposed by Feng Bao, Robert Deng, Khanh Quoc Nguyen
and Vijay Varadharajan is described and analyzed in section
2. The proposed protocol is presented and analyzed in
section3. In section 4, the paper is concluded.
II. CYCLIC FAIR EXCHANGE PROTOCOL WITH OFF-LINE TTP
In this section, the single unit cyclic fair exchange
protocol with off-line TTP introduced in [1] is briefly
described. The notations are described as follow.
For i=0, 1, 2…n-1
P0 : the initiator of the protocol
mi : the secret item owned by Pi and wanted by Pi+1
Mi : h (mi) and at least known by Pi+1 and TTP
ci : the encrypted value of mi under the public key ei
certi: the proof to convinced that mi is truly encrypted under
the key ei
Here, TTP knows the status of P0, public key (e) and
private key (d) of the cryptosystem. The channel is resilient.
The protocol use the verifiable encryption schemes to
convince that mi is actually encrypted under the key ei.
A. Main Protocol
 Pi Pi+1: ci, certi for i = 0,…,n-1
where ci=e (mi)
 Pi Pi+1: mi for i = 0,…, n-1.
Analysis and Improvement on a Single Unit
Cyclic Fair Exchange Protocol for Multi-party
Nay Chi Htun, Khin Khat Khat Kyaw
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1902
In the first round, P0 sends c0 and cert0 to P1. Then P1
checks that verify (c0, cert0, M0, e0) =yes to convince that c0 is
e0 (m0). After checking, P1 sends c1 and cert1 to P2 and so on
till Pn-1. In the second round, P0 sends m0 to P1. P1 sends m1 to
P2 and so on till Pn-1.
B. Recovery Protocol
 Pi TTP: ci-1, certi-1.
 TTP P0: call.
 P0 TTP: yes or abort.
 TTP Pi: mi-1 or abort.
In the second round, if Pi does not receive the mi, it can run
the recovery protocol with ci-1 and certi-1. Calling the recovery
protocol may be two different ways. If Pi is the first participant
who runs the recovery protocol, then TTP checks ceti-1, ask P0
whether P0 receives cn-1 and certin-1. If P0 answers ―yes‖, TTP
replies mi-1 to Pi. Otherwise, TTP sends ―abort‖ message to Pi.
If Pi is not the first participant who calls the recovery protocol,
TTP makes the decision according to the first time.
C. Analysis of the Protocol
In the protocol, every participant must trust in P0. Here P0
can say false ―yes‖ or ―abort‖ to fool other parties and the
honest parties can lose fairness. Assume that P3 colludes with
P0 to defeat other parties.
Example 1: P3 got m2 but did not send m3 to P4. When P4
runs recovery protocol with c2 and cert2, P0 says abort to TTP
even if it receives cn-1 and certin-1. So TTP replies ―abort‖
message to P4.
Example 2: P3 got c2 and cert2 but did not send c3 and cert3
to P4. Then P3 run the recovery protocol to get m2. When TTP
call P0, P0 replies ―yes‖ even though it did not receive cn-1 and
certin-1. As described in two examples, it can be seen clearly
that fairness can break down.
III. AN IMPROVED CYCLIC FAIR EXCHANGE PROTOCOL
In this section, the improved protocol will be described.
The notations and assumptions are similar to those of the
original protocol.
A. Main Protocol
 Pi Pi+1: ci, certi for i = 0,… ,n-1 where ci=e (mi,
SID, DID)
 Pi Pi+1: mi for i = 0,…,n-1
Main protocol is the same as the original protocol except
ci. In the original protocol, ci is the encrypted message of only
mi. So the dishonest party can cheat the information of the
other party and run the recovery protocol.
Example: Assume that P2 is dishonest party. Then P2
Recovery Protocol can cheat ci and certi (i= 1, 3, 4,... ,n-1) and
run recovery protocol.
In the proposed protocol, ci includes the encrypted message
of mi, source ID (SID) and destination ID (DID). Therefore,
TTP can check the intended receiver is whether P2 or not
when it decrypts the ci with the key d even if P2 cheats ci and
certi (i=1, 3, 4,…, n-1) and runs the recovery protocol.
B. Recovery Protocol
 Pi TTP : ci, certi, ci-1, certi-1.
 TTP Pi+1 : ci, certi or abort.
 TTP Pi : mi-1 or abort.
If Pi does not receive the mi, it must run the recovery
protocol with not only ci-1 and certi-1 but also ci and certi. Then
TTP does not call P0. Instead, TTP sends ci and certi to Pi+1
and mi-1 to Pi after TTP verifies and satisfies with the
information of Pi. Otherwise, TTP sends abort message to Pi
and Pi+1.
Figure 1. The Proposed Cyclic Fair Exchange Protocol for Multi Party
C. Analysis of the Protocol
Proposition 1: After the protocol (including the recovery
protocol) has executed, dishonest Pi can never achieve mi-1
without sending his secret information (ci, certi).
Proof: Fairness means ―Give and Take‖. To take the one
of the other , give the one of mine.
Condition 1: In the first round, for i=1,2,3,…,n-1,
dishonest Pi gets (ci-1,certi-1) from Pi-1. But dishonest Pi
doesn’t give (ci, certi) to Pi+1. However Pi wants mi-1and he
cannot get mi-1 from ci-1 because Pi doesn’t know the
decryption key. So Pi must call the recovery protocol with (ci,
certi) as well as (ci-1, certi-1). Consequently, TTP gets (ci,
certi) and TTP can forward to other parties. For that reason, Pi
cannot call the recovery protocol.
Condition 2: In the second round, if Pi gets mi-1 from Pi-1
and doesn’t give mi to Pi+1, then Pi+1 can run recovery protocol
and ask mi from TTP.
Condition 3: TTP can independently recover the mi-1 for
every honest party Pi without confirming the honesty of Pi
with the initiator.
Proposition 2: During the protocol, any dishonest party
(external or internal) cannot run the recovery protocol with
the cheating information (ci, certi) in order to get the actual
message mi-1.
Proof: In the proposed protocol, ci=e (mi, SID, DID),
where SID= source ID and DID= destination ID. So anyone
cannot fool TTP with illegal ci.
IV. CONCLUSION
Fairness plays a vital role in e-commerce applications.
The current multi-party cyclic fair exchange protocols still
have weak-points such as initiator dependence, high
c0,cert0P0
P1
Pi-1
Pi
Pi+1
Pn-1
c1, cert1
ci-1,certi-1
ci, certi
ci+1,
certi+1
cn-1,certn-1
ci,certi
or abort
mi or
abort
ci-1 ,certi-1,
ci, certi
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1903
www.ijarcet.org
communication overhead. The proposed protocol can
overcome those weak points. It can give the actual fairness for
multi-party exchange applications without trusting the
initiator. Communication overhead gets lower by deleting
broadcasted messages. Moreover, the proposed protocol
modifies the message ci. Therefore, it can prevent the
dishonest party from running the recovery protocol with the
cheated information.
ACKNOWLEDGMENT
We foremost thanks go to Professor Dr. Aung Win, the
Principal of the Technology of University in Yatanarpon
Cyber City, for welcoming our research and giving a hand for
us. Next, we would like to thank Professor Dr. Soe Soe
Khaing, the Head of the Department of Information and
Communication Technology in our university, for giving a
chance to fulfill my goal. Moreover, I also wish to thank to the
other members of our department for encouraging us and
offering guidelines about our research. Finally, our thanks go
to our families and friends for all the love and kindness they
give us.
REFERENCES
[1] Feng Bao, Robert Deng, Khanh Quoc Nguyen and Vijay Varadharajan,
―Multi-party fair exchange with an off-line trusted neutral party‖, in
DEXA’99 Workshop on Electronic Commerce and Security, Firenze,
Italy, September 1999.
[2] N. Gonza lez-Deleito and O. Markowitch, ―An optimistic multi-party
fair exchange protocol with reduced trust requirements‖, in
proceedings of the 4th
International Conference on Information
Security and Cryptology, LNCS 2288, Springer-Verlag, Dec.
2001,pp.258-267.
[3] Yi Liu, Hongli Hu, ―An improved protocol for optimistic multi-party
fair exchange‖, in International Conference on Electronic and
Mechanical Engineering and Information Technology, Aug.2011.
[4] N. Gonzalez-Deleito and O. Markowitch, ―Exclusion-freeness in
multi-party exchange protocols,‖ in 5th
International Conference on
Information Security, LNCS 2433, Springer-Verlag, 2002, pp.
200-209.
[5] N. Asokan, M. Schunter, and M. Waidner, ―Optimistic protocols for
multi-party fair exchange‖, research report RZ 2892 (# 90840),
IBM Research, Dec. 1996.
[6] M. Franklin and G. Tsudik, ―Secure group barter: multi-party fair
exchange with semi-trusted neutral parties‖, Financial, cryto’98,
LNCS, Springer-Verlag, 1998.
Ms. Nay Chi Htun is a post-graduate student at University of Technology
in Yatanarpon Cyber City, Myanmar.
Mrs. Khin Khat Khat Kyaw is an Assistant Professor at the faculty of
Information and Communication Technology in University of Technology ,
Yatanarpon Cyber City ,Myanmar.

More Related Content

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Editor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Recently uploaded (20)

Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

1901 1903

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1901 www.ijarcet.org  Abstract— With the widespread utilization of e-commerce, improving fair exchange service becomes an important role in research area. A cyclic fair exchange protocol for multi party was proposed by Feng Bao, Robert Deng, Khanh Quoc Nguyen and Vijay Varadharajan in 1999. According to this protocol, the user must trust in not only the Trusted Third Party (TTP) but also the initiator. This paper proposes a modified multi-party fair exchange protocol that does not depend on the initiator in order to provide fairness. Index Terms— e-commerce, cyclic-exchange, multi-party, fairness, initiator I. INTRODUCTION Fairness is one popular research topic in Network Security area. A protocol can be said as ―fair‖ on condition that after performing that protocol, all members must have the same chance and same authority to influence another member. Assume that two members have their own important information and each member wants the information from the other. So each member agrees on one exchange protocol that he expects to get fairness. After performing this protocol, receiving respective information and same authority satisfied each member. Such a protocol is fair exchange protocol. Fair exchange is usually performed with Trusted Third Party (TTP).TTP is the third party whom believed by both parties. Without TTP, the actual fairness cannot be obtained. Depending on the level of TTP involvement, a protocol can be described in two types: online-TTP and offline-TTP. With online-TTP, every exchange step of the protocol must be noticed by TTP. With offline-TTP, TTP is necessary only when some unnatural behaviors occur. A protocol can be idealized to be optimistic if it can delete the involvement of TTP in the whole exchange process. Later, researchers tried to gain fairness for more than two parties. These protocols are named as multi-party fair exchange (MPFE) protocols. MPFE based on two exchange methods: Cyclic and General. In Cyclic, the exchange’s topology is a ring in which each participant Pi offers to participant Pi+1 message mi in exchange of message mi-1 offered by participant Pi-1 [1]–[4]. In general, each entity can communicate with the set of entities of his choice [5]. Moreover, the exchanged item may be defined as single unit Manuscript received May, 2013. Ms.Nay Chi Htun, Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), (Pyin Oo Lwin, Myanmar Mrs. Khin Khat Khat Kyaw Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo Lwin, Myanmar or multi units. So there are four classes of MPFE: single-unit cyclic exchange, single-unit general exchange, multi-unit cyclic exchange and multi-unit general exchange [6]. In this paper, a cyclic fair exchange protocol for multi-party will be modified and analyzed. In [1], the protocol is applicable for multi-unit or single-unit cyclic exchange. Multi- unit general model could also be achieved with some restrictions. However, participants who agree on the protocol must trust in both TTP and the initiator to achieve the fairness. In 2001, N. Gonzalez Deleito and O. Markowitch proposed a method to cancel the initiator dependence [2]. However, the communication overhead is dramatically increased because of many broadcasted messages [3]. In 2011, Yi Liu and Hongli Hu modified the same protocol to cancel the initiator dependence with low communication overhead. They use the equation: f (a). f (b) = f (ab),f (y) =y2 mod N where N is the product of two prime numbers. There are many possible number pairs that satisfy above these equations. For example, f(15).f (16) = f (15.16) where N= 13* 17.So authentication may be broken down by Dictionary attack. In the proposed protocol, the participants need to trust only in TTP. The communication overhead is not high because no message is broadcasted many times. The paper is organized as follow. The original protocol proposed by Feng Bao, Robert Deng, Khanh Quoc Nguyen and Vijay Varadharajan is described and analyzed in section 2. The proposed protocol is presented and analyzed in section3. In section 4, the paper is concluded. II. CYCLIC FAIR EXCHANGE PROTOCOL WITH OFF-LINE TTP In this section, the single unit cyclic fair exchange protocol with off-line TTP introduced in [1] is briefly described. The notations are described as follow. For i=0, 1, 2…n-1 P0 : the initiator of the protocol mi : the secret item owned by Pi and wanted by Pi+1 Mi : h (mi) and at least known by Pi+1 and TTP ci : the encrypted value of mi under the public key ei certi: the proof to convinced that mi is truly encrypted under the key ei Here, TTP knows the status of P0, public key (e) and private key (d) of the cryptosystem. The channel is resilient. The protocol use the verifiable encryption schemes to convince that mi is actually encrypted under the key ei. A. Main Protocol  Pi Pi+1: ci, certi for i = 0,…,n-1 where ci=e (mi)  Pi Pi+1: mi for i = 0,…, n-1. Analysis and Improvement on a Single Unit Cyclic Fair Exchange Protocol for Multi-party Nay Chi Htun, Khin Khat Khat Kyaw
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 www.ijarcet.org 1902 In the first round, P0 sends c0 and cert0 to P1. Then P1 checks that verify (c0, cert0, M0, e0) =yes to convince that c0 is e0 (m0). After checking, P1 sends c1 and cert1 to P2 and so on till Pn-1. In the second round, P0 sends m0 to P1. P1 sends m1 to P2 and so on till Pn-1. B. Recovery Protocol  Pi TTP: ci-1, certi-1.  TTP P0: call.  P0 TTP: yes or abort.  TTP Pi: mi-1 or abort. In the second round, if Pi does not receive the mi, it can run the recovery protocol with ci-1 and certi-1. Calling the recovery protocol may be two different ways. If Pi is the first participant who runs the recovery protocol, then TTP checks ceti-1, ask P0 whether P0 receives cn-1 and certin-1. If P0 answers ―yes‖, TTP replies mi-1 to Pi. Otherwise, TTP sends ―abort‖ message to Pi. If Pi is not the first participant who calls the recovery protocol, TTP makes the decision according to the first time. C. Analysis of the Protocol In the protocol, every participant must trust in P0. Here P0 can say false ―yes‖ or ―abort‖ to fool other parties and the honest parties can lose fairness. Assume that P3 colludes with P0 to defeat other parties. Example 1: P3 got m2 but did not send m3 to P4. When P4 runs recovery protocol with c2 and cert2, P0 says abort to TTP even if it receives cn-1 and certin-1. So TTP replies ―abort‖ message to P4. Example 2: P3 got c2 and cert2 but did not send c3 and cert3 to P4. Then P3 run the recovery protocol to get m2. When TTP call P0, P0 replies ―yes‖ even though it did not receive cn-1 and certin-1. As described in two examples, it can be seen clearly that fairness can break down. III. AN IMPROVED CYCLIC FAIR EXCHANGE PROTOCOL In this section, the improved protocol will be described. The notations and assumptions are similar to those of the original protocol. A. Main Protocol  Pi Pi+1: ci, certi for i = 0,… ,n-1 where ci=e (mi, SID, DID)  Pi Pi+1: mi for i = 0,…,n-1 Main protocol is the same as the original protocol except ci. In the original protocol, ci is the encrypted message of only mi. So the dishonest party can cheat the information of the other party and run the recovery protocol. Example: Assume that P2 is dishonest party. Then P2 Recovery Protocol can cheat ci and certi (i= 1, 3, 4,... ,n-1) and run recovery protocol. In the proposed protocol, ci includes the encrypted message of mi, source ID (SID) and destination ID (DID). Therefore, TTP can check the intended receiver is whether P2 or not when it decrypts the ci with the key d even if P2 cheats ci and certi (i=1, 3, 4,…, n-1) and runs the recovery protocol. B. Recovery Protocol  Pi TTP : ci, certi, ci-1, certi-1.  TTP Pi+1 : ci, certi or abort.  TTP Pi : mi-1 or abort. If Pi does not receive the mi, it must run the recovery protocol with not only ci-1 and certi-1 but also ci and certi. Then TTP does not call P0. Instead, TTP sends ci and certi to Pi+1 and mi-1 to Pi after TTP verifies and satisfies with the information of Pi. Otherwise, TTP sends abort message to Pi and Pi+1. Figure 1. The Proposed Cyclic Fair Exchange Protocol for Multi Party C. Analysis of the Protocol Proposition 1: After the protocol (including the recovery protocol) has executed, dishonest Pi can never achieve mi-1 without sending his secret information (ci, certi). Proof: Fairness means ―Give and Take‖. To take the one of the other , give the one of mine. Condition 1: In the first round, for i=1,2,3,…,n-1, dishonest Pi gets (ci-1,certi-1) from Pi-1. But dishonest Pi doesn’t give (ci, certi) to Pi+1. However Pi wants mi-1and he cannot get mi-1 from ci-1 because Pi doesn’t know the decryption key. So Pi must call the recovery protocol with (ci, certi) as well as (ci-1, certi-1). Consequently, TTP gets (ci, certi) and TTP can forward to other parties. For that reason, Pi cannot call the recovery protocol. Condition 2: In the second round, if Pi gets mi-1 from Pi-1 and doesn’t give mi to Pi+1, then Pi+1 can run recovery protocol and ask mi from TTP. Condition 3: TTP can independently recover the mi-1 for every honest party Pi without confirming the honesty of Pi with the initiator. Proposition 2: During the protocol, any dishonest party (external or internal) cannot run the recovery protocol with the cheating information (ci, certi) in order to get the actual message mi-1. Proof: In the proposed protocol, ci=e (mi, SID, DID), where SID= source ID and DID= destination ID. So anyone cannot fool TTP with illegal ci. IV. CONCLUSION Fairness plays a vital role in e-commerce applications. The current multi-party cyclic fair exchange protocols still have weak-points such as initiator dependence, high c0,cert0P0 P1 Pi-1 Pi Pi+1 Pn-1 c1, cert1 ci-1,certi-1 ci, certi ci+1, certi+1 cn-1,certn-1 ci,certi or abort mi or abort ci-1 ,certi-1, ci, certi
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1903 www.ijarcet.org communication overhead. The proposed protocol can overcome those weak points. It can give the actual fairness for multi-party exchange applications without trusting the initiator. Communication overhead gets lower by deleting broadcasted messages. Moreover, the proposed protocol modifies the message ci. Therefore, it can prevent the dishonest party from running the recovery protocol with the cheated information. ACKNOWLEDGMENT We foremost thanks go to Professor Dr. Aung Win, the Principal of the Technology of University in Yatanarpon Cyber City, for welcoming our research and giving a hand for us. Next, we would like to thank Professor Dr. Soe Soe Khaing, the Head of the Department of Information and Communication Technology in our university, for giving a chance to fulfill my goal. Moreover, I also wish to thank to the other members of our department for encouraging us and offering guidelines about our research. Finally, our thanks go to our families and friends for all the love and kindness they give us. REFERENCES [1] Feng Bao, Robert Deng, Khanh Quoc Nguyen and Vijay Varadharajan, ―Multi-party fair exchange with an off-line trusted neutral party‖, in DEXA’99 Workshop on Electronic Commerce and Security, Firenze, Italy, September 1999. [2] N. Gonza lez-Deleito and O. Markowitch, ―An optimistic multi-party fair exchange protocol with reduced trust requirements‖, in proceedings of the 4th International Conference on Information Security and Cryptology, LNCS 2288, Springer-Verlag, Dec. 2001,pp.258-267. [3] Yi Liu, Hongli Hu, ―An improved protocol for optimistic multi-party fair exchange‖, in International Conference on Electronic and Mechanical Engineering and Information Technology, Aug.2011. [4] N. Gonzalez-Deleito and O. Markowitch, ―Exclusion-freeness in multi-party exchange protocols,‖ in 5th International Conference on Information Security, LNCS 2433, Springer-Verlag, 2002, pp. 200-209. [5] N. Asokan, M. Schunter, and M. Waidner, ―Optimistic protocols for multi-party fair exchange‖, research report RZ 2892 (# 90840), IBM Research, Dec. 1996. [6] M. Franklin and G. Tsudik, ―Secure group barter: multi-party fair exchange with semi-trusted neutral parties‖, Financial, cryto’98, LNCS, Springer-Verlag, 1998. Ms. Nay Chi Htun is a post-graduate student at University of Technology in Yatanarpon Cyber City, Myanmar. Mrs. Khin Khat Khat Kyaw is an Assistant Professor at the faculty of Information and Communication Technology in University of Technology , Yatanarpon Cyber City ,Myanmar.