SlideShare a Scribd company logo
Rajasree R.S., Sonali Patil / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.066-069
66 | P a g e
Fair Contract Signing Protocol Based On Secret Sharing
Rajasree R.S., Sonali Patil
Department Of Computer Engineering
Pimpri Chinchwad College Of Engineering,Nigdi,Pune-44
ABSTRACT
A fair contract signing protocol allows
two potentially mistrusted parties to exchange
their commitments to an agreed contract over the
Internet in a fair way so that either each of them
obtains the others signature or neither party
does. The existing protocols face the problem of
more number of transactions in between TTP
and party. Also the time complexity and compu-
tational complexities are more. In this paper we
are proposing a fair contract signing protocol
based on secret sharing scheme. The proposed
method satisfies property of abuse freeness and
fairness. That is if the protocol is executed unsuc-
cessfully, none of the two parties can show the
validity of intermediate results to others. The
proposed scheme is more reliable, secure and less
complex .
Keywords: Contract signing, Secret Sharing, Visual
Cryptography
1. Introduction
Contract signing plays a very important role
in any business transaction, in particular in situations
where the involved parties do not trust each other to
some extent already. Contract signing is truly simple
due to the existence of “simultaneity.” That is, both
parties generally sign two hard copies of the same
contract at the same place and at the same time.
After that, each party keeps one copy as a
legal document that shows both of them have com-
mitted to the contract. If one party does not abide by
the contract, the other party could provide the signed
contract to a judge in court. As electronic commerce
is becoming more and more important and popular
in the world, it is desirable to have a mechanism that
allows two parties to sign a digital contract via the
Internet.However; the problem of contract signing
becomes difficult in this setting, since there is no
simultaneity any more in the scenario of computer
networks. In other words, the simultaneity has to be
mimicked in order to design a digital contract-
signing protocol. Information is exchanged in com-
puter networks nonsimultaneously, so at least an
unfair state must be passed through. From the view
point of technique, the problem of digital contract
signing belongs to a wider topic: fair exchange. Ac-
tually, fair exchange includes the following different
but related issues: contract-signing protocols, certi-
fied e-mail systems nonrepudiation protocols and e-
payment schemes in electronic commerce .In this
paper, the problem of digital contract signing be-
tween two parties is focused. Since a party‟s com-
mitment to a digital contract is usually defined as
his/her digital signature on the contract, digital con-
tract signing is essentially implied by fair exchange
of digital signatures between two potentially mi-
strusted parties. There is a rich history of contract
signing (i.e., fair exchangeof digital signatures) be-
cause this is a fundamental problem in electronic
transactions.
2. Existing System
According to the involvement degree of a
trusted third party (TTP), contract-signing protocols
can be divided into three types: 1) gradual exchanges
without any TTP; 2) protocols with an on-line
TTP[1]; and 3) protocols with an off-line TTP. Early
efforts mainly focused on the first type of protocols
to meet computational fairness: Both parties ex-
change their commitments/secrets “bit-by-bit.”If one
party stops prematurely, both parties have about the
same fraction of the peer‟s secret, which means that
they can complete the contract off-line by investing
about the same amount of computing work, e.g.,
exclusively searching the remaining bits of the se-
crets.
The major advantage of this approach is
that no TTP is involved. However, this approach is
unrealistic for most real-world applications due to
the following reasons. First of all, it is assumed that
the two parties have equivalent or related computa-
tion resources. Otherwise, such a protocol is favora-
ble to the party with stronger computing power, who
may conditionally force the other party to commit
the contract by its own interest. At the same time,
such protocols are inefficient because the costs of
computation and communication are extensive. In
addition, this approach has the unsatisfactory proper-
ty of uncertain termination. In the second type of fair
exchange protocols an on-line TTP is always in-
volved in every exchange. In this scenario TTP is
essentially a mediator: a) Each party first sends
his/her item to the TTP; b) then, the TTP checks the
validity of those items; c) if all expected items are
correctly received, the TTP finally forwards each
item to the party who needs it. Contract-signing pro-
tocols with an on-line TTP could be designed more
easily since the TTP facilitates the execution of each
exchange, but may be still expensive and inefficient
because the TTP needs to be paid and must be part
of every execution.
Rajasree R.S., Sonali Patil / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.
67 | P a g e
2.1 RSA Cryptosystem
Existing system use the RSA crypto system [8]and is
now the de facto industrial standard.
Alice sets an RSA modulus n=pq whwre p and q
are two safe k bit primes and sets her public key e
ЄR Z*
Ф(n), and calculates her private key
d=e -1
modФ(n) (1)
where modФ(n) is Euler‟s totient function. Then,
she registers her public key with a certification au-
thority (CA) to get her certificate .After that, Alice
randomly splits d into d1 and d2 so that d=d1+d2,
where e ЄR Z*
Ф(n). To get a voucher VA from a TTP,
Alice is required to send
(CA,e 1,d 2)to the TTP, where
e1=d1
-1
modФ(n) (2)
The voucher is the TTP‟s signature that implicitly
shows two facts:
1)e1 can be used to verify a partial signature gen-
erated by using secret key d1, and
2) the TTP knows a secret d2 matches with RSA
key pairs (d1,e1)and (d,e) .When Alice and Bob want
to exchange their signatures on a message m, Alice
first computes
µ1=h(m)d1mod n (3)
and sends (CA,VA,µ 1) to Bob, where h(.)is a se-
cure hash function.Upon receiving , Bob checks the
validity of CAand VA, and whether h(m)=µ1
e1
mod
n. If all those verificationsgo through, Bob returns
his signature µ B to Alice, since he is convinced that
the expected
µ2=h(m)d2
mod n (4)
can be revealed by Bob or the TTP. After receiv-
ing valid µB Alice reveals µ2=h(m)d2
mod n to Bob.
Finally, Bob obtains Alice‟signature µ A for mes-
sage by setting , µA= µ 1µ 2since we have
h(m)ΞµA
e
=h(m)(d1+d2)e
=h(m)de
mod n. (5)
The security problem in Park „sscheme [9]is that
an honest-but-curious TTP can easily derive Alice‟s
private key d.The reason is that with the knowledge
of (n,e,e1,d2), the TTP knows that the integer e-(1-ed
2)e 1 is a nonzero multiple ofФ(n). It is well known
that knowing such a multiple of Ф(n),Alice‟s RSA
modulus n can be easily factored. Consequently, the
TTP can get Alice‟s private key by the extended
Euclidean algorithm.
[5] In rsa based solution is there for fair contract
signing ,The protocol is based on an RSA multisig-
nature, which is formally proved to be secure .This
protocol is fair and optimistic. Furthermore, different
from the above existing schemes,theprotocol is
abuse-free.But the existing system does not suit for
multi party signature,whwre only a single TTP and
two users can exchange their signatures
3 PROPOSED SYSTEM
This paper proposes a new secure method
for fair contract signing. The protocol method is
based on secret sharing[6], [7].The first step in ex-
changing the signatures is Registration with the
TTP.The following is the registration protocol that
register the users with the TTP.
3.1 REGISTRATION PROTOCOL
To use our protocol for exchanging digital signa-
tures,both Alice and Bob has to register with the
TTP.
1) Alice and Bob registers their public key with a
CA to get their certificate CA
2) Then Both Alice and Bob sends their CA to the
TTP to register with the TTP.
3) The TTP first checks that A certificate CA is
valid.If the certificates are valid TTP sends a
long term voucher Va to both the users.Va is
TTP,s signature on the contract
The above registration protocol is little bit compli-
cated .But this is to be done only once for a
long period of time.
. The parties uses (2, 2) secret sharing [7] for con-
structng the 2 shares of their signature. The
method is divided into 3 steps:
a. Construction of shares of signature
b. Distribution of shares
c. Reconstruction of signature
a. Construction of shares of signature
 The original signature image is considered as
an input
 Apply the (2, 2) visual cryptography [7] to
crate the 2 shares for the signature image.
 Both the parties will create 2 shares of their
signatures.
Shares of Bob
share1 (SB1) share2 (SB2)
Shares of Alice
s
Share 1 (SA1) Share 2 (SA2)
b)Distribution of Shares
Rajasree R.S., Sonali Patil / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.
68 | P a g e
After the shares are constructed by both the par-
ticipants the shares are to be distributed each other
partialy.A partial share is given to the TTP also in-
order to improve security.
DisD
Distribution Of Shares
The above figure shows the distribution of shares
After registering with the TTP both Alice and bob
exchange their shres by the following steps
1)Alice and Bob first send one of their
shares(SA1,SB1) to the TTP along with their vouch-
ers(Va,Vb).They keep the other part of their shares
(SA2,SB2) secret.
2)TTP then verifies the vouchers and stores their
shares
3)Alice then sends the second part of her
share(SA2) to Bob.On receiving the share ,Bob sends
the second part of his share(SB2) to Alice
4)Now TTP can send the other part of their
shares((SA1,SB1) to both Alice and Bob
c. Reconstruction Of Shares
1)On receiving both the shares of Alice,Bob re-
constructs the original share from it
+ =ALICE
2)On receiving both the share s of Bob,Alice recon-
structs the original secret by stacking 2 shares to-
gether.
+ =BOB
Our protocol guarantees the two parities involved to
obtain or not obtain the other‟s signature simulta-
neously.This property implies that even a dishonest
party who tries to cheat cannot get an advantage
over the other.
4. Properties
1)Abuse-Freeness
If the whole protocol is not finished suc-
cessfully,any of the two parties cannot show the va-
lidity of the intermediate results generated by the
other to an outsider,either during or after the proce-
dure where those intermediate results are produced.
2)Timely Termination:
The execution of a protocol instance will
be terminated in a predetermined time. This property
is implemented by adding a reasonable deadline in a
contract. If one party does not send his/her signature
to the other party after the deadline , both of them
are free of liability to their partial commitments to
the contract and do not need to wait any more.
3) Compatibility:
In our protocol, each party‟s commitment to
a contract is a standard digital signature. This means
that to use the protocol in existing systems, there is
no need to modify the signature scheme or message
forma at all. Thus, it will be very convenient to inte-
grate the contract-signing protocol into existing
software for electronic transactions.
4) High Performance:
In a typical implementation, the protocol
execution in a normal case requires only interaction
of several rounds between two parties, transmission
of about one thousand bytes of data, and computa-
tion of a few modular exponentiations by each party.
CONCLUSION
The proposed scheme reduces the computa-
tional complexities by avoiding the use of complex
equations with secret sharing algorithm. The (2, 2)
secret sharing algorithm is very simple, less complex
and reduces the number of transactions in between
TTP and party.
The proposed scheme can be easily extended for n
participants using (n, n) secret sharing. Also number
of TTPs can be increased.
References
[1] Abadi, N. Glew, B. Horne, and B. Pinkas,
“Certified e-mail with a light on-line trusted
third party: Design and implementation,” in
Proc.2002 Int.World Wide Web Conf.
(WWW‟02), 2002, pp. 387–395, ACM
Press.
[2] N. Asokan, V. Shoup, and M. Waidner,
“Optimistic fair exchange of digital signa-
tures,” in Proc. EUROCRYPT‟98, 1998,
vol. 1403, LNCS, pp. 591–606, Springer-
Verlag.
[3] N. Asokan, V. Shoup, and M. Waidner,
“Optimistic fair exchange of digital signa-
tures,” IEEE J. Sel. Areas Commun., vol.
18, no. 4, pp.591–606, Apr. 2000.
Rajasree R.S., Sonali Patil / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.
69 | P a g e
[4] G. Ateniese, “Efficient verifiable encryp-
tion (and fair exchange) of digital signa-
ture,” in Proc. ACMConf. Computer and
Communications Security
[5] Rajasree R. S., “RSA based solution for fair
contracr signing” International Journal of
Engineering Research and Technology,
Vol. 1, Issue 8.
[6] A. Shamir, “How to share a secret,” Com-
munications of the ACM, vol. 22, no. 11,
pp. 612–613, Nov. 1979.
[7] M. Naor, A. Shamir, “Visual cryptogra-
phy”, Proc. Eurocrypt ‟94, Lecture Notes
Computer Sci., Vol. 950, pp.1-12, 1994.
[8] R.L.Rivest ,A.Shamir and L.Adleman
,”Amethod for obtaining digital signature
and public-key crypto-
system”,commun.ACM,vol.21 no.2 ,pp.
120-126,Feb.1978
[9] J.M.Park,E.Chhong ,H.J. Siegel and I.Ray
,”Constructing fair exchange for e-
commerce via distributed computation of
RSA signatures” in Proc.PODC ,2003
,pp172-181,ACM press

More Related Content

What's hot

Authentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signatureAuthentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signature
TELKOMNIKA JOURNAL
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Tharindu Weerasinghe
 
Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2
editor1knowledgecuddle
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
IJNSA Journal
 
IRJET - Hash Functions and its Security for Snags
IRJET -  	  Hash Functions and its Security for SnagsIRJET -  	  Hash Functions and its Security for Snags
IRJET - Hash Functions and its Security for Snags
IRJET Journal
 
Cns 1
Cns 1Cns 1
Secured Source Anonymous Message Authentication Using Wireless Sensor Network
Secured Source Anonymous Message Authentication Using Wireless Sensor NetworkSecured Source Anonymous Message Authentication Using Wireless Sensor Network
Secured Source Anonymous Message Authentication Using Wireless Sensor Network
iosrjce
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemes
ravik09783
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
Brijesh Vishwakarma
 
AN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEM
AN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEMAN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEM
AN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEM
Zac Darcy
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data Mining
IJMER
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
50620130101002
5062013010100250620130101002
50620130101002
IAEME Publication
 
Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol
Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol  Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol
Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol
ijujournal
 
The efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamalThe efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamal
IAEME Publication
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
IOSR Journals
 
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITYEFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
IJNSA Journal
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Ch13
Ch13Ch13
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
Shakas Technologies
 

What's hot (20)

Authentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signatureAuthentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signature
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
 
Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 
IRJET - Hash Functions and its Security for Snags
IRJET -  	  Hash Functions and its Security for SnagsIRJET -  	  Hash Functions and its Security for Snags
IRJET - Hash Functions and its Security for Snags
 
Cns 1
Cns 1Cns 1
Cns 1
 
Secured Source Anonymous Message Authentication Using Wireless Sensor Network
Secured Source Anonymous Message Authentication Using Wireless Sensor NetworkSecured Source Anonymous Message Authentication Using Wireless Sensor Network
Secured Source Anonymous Message Authentication Using Wireless Sensor Network
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemes
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
AN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEM
AN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEMAN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEM
AN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEM
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data Mining
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
50620130101002
5062013010100250620130101002
50620130101002
 
Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol
Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol  Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol
Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol
 
The efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamalThe efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamal
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
 
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITYEFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Ch13
Ch13Ch13
Ch13
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 

Viewers also liked

T33108112
T33108112T33108112
T33108112
IJERA Editor
 
By33458461
By33458461By33458461
By33458461
IJERA Editor
 
Fx3310581062
Fx3310581062Fx3310581062
Fx3310581062
IJERA Editor
 
Du33731735
Du33731735Du33731735
Du33731735
IJERA Editor
 
Lázaro e o rico
Lázaro e o ricoLázaro e o rico
Lázaro e o rico
diruab
 
Evalation of jouralism
Evalation of jouralismEvalation of jouralism
Evalation of jouralismMFJ
 
C:\Fakepath\Izadas De Bandera
C:\Fakepath\Izadas De BanderaC:\Fakepath\Izadas De Bandera
C:\Fakepath\Izadas De Bandera
ALEJANDROBARRAGAN
 
6A - Dengue1 carlos e wanderson
6A - Dengue1 carlos e wanderson6A - Dengue1 carlos e wanderson
6A - Dengue1 carlos e wanderson
viannota
 
OPTION RESIDENCIAL COM SERVIÇOS NO RECREIO - Ligue (21) 3091-0191
OPTION RESIDENCIAL COM SERVIÇOS NO RECREIO - Ligue (21) 3091-0191OPTION RESIDENCIAL COM SERVIÇOS NO RECREIO - Ligue (21) 3091-0191
OPTION RESIDENCIAL COM SERVIÇOS NO RECREIO - Ligue (21) 3091-0191
lucianobatista
 
Direcciones ip yamile
Direcciones ip yamileDirecciones ip yamile
Direcciones ip yamile
jesus
 
Feudal japan
Feudal japanFeudal japan
Feudal japan
Rachel Collishaw
 
Estructura y bioquimica de cereales
Estructura y bioquimica de cerealesEstructura y bioquimica de cereales
Estructura y bioquimica de cereales
Diana Coello
 
Elaboración de Pepperoni
Elaboración de PepperoniElaboración de Pepperoni
Elaboración de Pepperoni
Diana Coello
 
Ecuaciones
EcuacionesEcuaciones
Ecuaciones
marlene
 
#TallerH Redes Sociales
#TallerH Redes Sociales#TallerH Redes Sociales
#TallerH Redes Sociales
Hoempler
 
Prepárate!
Prepárate!Prepárate!
Prepárate!
diego
 
20 august janta ka aina (3)
20 august janta ka aina (3)20 august janta ka aina (3)
20 august janta ka aina (3)Janta Ka Aaina
 
Informationen Intimchirurgie
Informationen IntimchirurgieInformationen Intimchirurgie
Informationen Intimchirurgie
guest050574a
 
NHS Points 4-26-10
NHS Points 4-26-10NHS Points 4-26-10
NHS Points 4-26-10
nationalhonorsociety
 
Shrikrishnayogashram bhavanjali
Shrikrishnayogashram bhavanjaliShrikrishnayogashram bhavanjali
Shrikrishnayogashram bhavanjali
shreeom
 

Viewers also liked (20)

T33108112
T33108112T33108112
T33108112
 
By33458461
By33458461By33458461
By33458461
 
Fx3310581062
Fx3310581062Fx3310581062
Fx3310581062
 
Du33731735
Du33731735Du33731735
Du33731735
 
Lázaro e o rico
Lázaro e o ricoLázaro e o rico
Lázaro e o rico
 
Evalation of jouralism
Evalation of jouralismEvalation of jouralism
Evalation of jouralism
 
C:\Fakepath\Izadas De Bandera
C:\Fakepath\Izadas De BanderaC:\Fakepath\Izadas De Bandera
C:\Fakepath\Izadas De Bandera
 
6A - Dengue1 carlos e wanderson
6A - Dengue1 carlos e wanderson6A - Dengue1 carlos e wanderson
6A - Dengue1 carlos e wanderson
 
OPTION RESIDENCIAL COM SERVIÇOS NO RECREIO - Ligue (21) 3091-0191
OPTION RESIDENCIAL COM SERVIÇOS NO RECREIO - Ligue (21) 3091-0191OPTION RESIDENCIAL COM SERVIÇOS NO RECREIO - Ligue (21) 3091-0191
OPTION RESIDENCIAL COM SERVIÇOS NO RECREIO - Ligue (21) 3091-0191
 
Direcciones ip yamile
Direcciones ip yamileDirecciones ip yamile
Direcciones ip yamile
 
Feudal japan
Feudal japanFeudal japan
Feudal japan
 
Estructura y bioquimica de cereales
Estructura y bioquimica de cerealesEstructura y bioquimica de cereales
Estructura y bioquimica de cereales
 
Elaboración de Pepperoni
Elaboración de PepperoniElaboración de Pepperoni
Elaboración de Pepperoni
 
Ecuaciones
EcuacionesEcuaciones
Ecuaciones
 
#TallerH Redes Sociales
#TallerH Redes Sociales#TallerH Redes Sociales
#TallerH Redes Sociales
 
Prepárate!
Prepárate!Prepárate!
Prepárate!
 
20 august janta ka aina (3)
20 august janta ka aina (3)20 august janta ka aina (3)
20 august janta ka aina (3)
 
Informationen Intimchirurgie
Informationen IntimchirurgieInformationen Intimchirurgie
Informationen Intimchirurgie
 
NHS Points 4-26-10
NHS Points 4-26-10NHS Points 4-26-10
NHS Points 4-26-10
 
Shrikrishnayogashram bhavanjali
Shrikrishnayogashram bhavanjaliShrikrishnayogashram bhavanjali
Shrikrishnayogashram bhavanjali
 

Similar to N33066069

Symmetric Key Encryption Decryption Technique Using Image Based Key Generation
Symmetric Key Encryption Decryption Technique Using Image Based Key GenerationSymmetric Key Encryption Decryption Technique Using Image Based Key Generation
Symmetric Key Encryption Decryption Technique Using Image Based Key Generation
IRJET Journal
 
H0342043046
H0342043046H0342043046
H0342043046
ijceronline
 
OPTIMIZING ONE FAIR DOCUMENT EXCHANGE PROTOCOL
OPTIMIZING ONE FAIR DOCUMENT EXCHANGE PROTOCOLOPTIMIZING ONE FAIR DOCUMENT EXCHANGE PROTOCOL
OPTIMIZING ONE FAIR DOCUMENT EXCHANGE PROTOCOL
IJNSA Journal
 
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY
csandit
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
IRJET Journal
 
A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications
A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications
A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications
IJNSA Journal
 
A secure payment scheme in multihop
A secure payment scheme in multihopA secure payment scheme in multihop
A secure payment scheme in multihop
prj_publication
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...
prjpublications
 
LAND REGISTRY SYSTEM USING BLOCKCHAIN
LAND REGISTRY SYSTEM USING BLOCKCHAINLAND REGISTRY SYSTEM USING BLOCKCHAIN
LAND REGISTRY SYSTEM USING BLOCKCHAIN
IRJET Journal
 
SPDZ-BASED OPTIMISTIC FAIR MULTI-PARTY COMPUTATION
SPDZ-BASED OPTIMISTIC FAIR MULTI-PARTY COMPUTATIONSPDZ-BASED OPTIMISTIC FAIR MULTI-PARTY COMPUTATION
SPDZ-BASED OPTIMISTIC FAIR MULTI-PARTY COMPUTATION
IJNSA Journal
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Nexgen Technology
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymous
nexgentech15
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
nexgentechnology
 
Blockchain-based Applications
Blockchain-based ApplicationsBlockchain-based Applications
Blockchain-based Applications
Sadegh Dorri N.
 
Secure and Transparent Insurance Application using Blockchain Technology
Secure and Transparent Insurance Application using Blockchain TechnologySecure and Transparent Insurance Application using Blockchain Technology
Secure and Transparent Insurance Application using Blockchain Technology
IRJET Journal
 
A typical analysis of hybrid covert channel using constructive entropy analy...
A typical analysis of hybrid covert channel using constructive  entropy analy...A typical analysis of hybrid covert channel using constructive  entropy analy...
A typical analysis of hybrid covert channel using constructive entropy analy...
IJECEIAES
 
Blind multi-signature scheme based on factoring and discrete logarithm problem
Blind multi-signature scheme based on factoring and discrete logarithm problemBlind multi-signature scheme based on factoring and discrete logarithm problem
Blind multi-signature scheme based on factoring and discrete logarithm problem
TELKOMNIKA JOURNAL
 
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTSA SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
AIRCC Publishing Corporation
 
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTSA SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
ijcsit
 
A Systematic Mapping Study on Current Research Topics in Smart Contracts
A Systematic Mapping Study on Current Research Topics in Smart ContractsA Systematic Mapping Study on Current Research Topics in Smart Contracts
A Systematic Mapping Study on Current Research Topics in Smart Contracts
AIRCC Publishing Corporation
 

Similar to N33066069 (20)

Symmetric Key Encryption Decryption Technique Using Image Based Key Generation
Symmetric Key Encryption Decryption Technique Using Image Based Key GenerationSymmetric Key Encryption Decryption Technique Using Image Based Key Generation
Symmetric Key Encryption Decryption Technique Using Image Based Key Generation
 
H0342043046
H0342043046H0342043046
H0342043046
 
OPTIMIZING ONE FAIR DOCUMENT EXCHANGE PROTOCOL
OPTIMIZING ONE FAIR DOCUMENT EXCHANGE PROTOCOLOPTIMIZING ONE FAIR DOCUMENT EXCHANGE PROTOCOL
OPTIMIZING ONE FAIR DOCUMENT EXCHANGE PROTOCOL
 
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
 
A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications
A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications
A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications
 
A secure payment scheme in multihop
A secure payment scheme in multihopA secure payment scheme in multihop
A secure payment scheme in multihop
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...
 
LAND REGISTRY SYSTEM USING BLOCKCHAIN
LAND REGISTRY SYSTEM USING BLOCKCHAINLAND REGISTRY SYSTEM USING BLOCKCHAIN
LAND REGISTRY SYSTEM USING BLOCKCHAIN
 
SPDZ-BASED OPTIMISTIC FAIR MULTI-PARTY COMPUTATION
SPDZ-BASED OPTIMISTIC FAIR MULTI-PARTY COMPUTATIONSPDZ-BASED OPTIMISTIC FAIR MULTI-PARTY COMPUTATION
SPDZ-BASED OPTIMISTIC FAIR MULTI-PARTY COMPUTATION
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymous
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 
Blockchain-based Applications
Blockchain-based ApplicationsBlockchain-based Applications
Blockchain-based Applications
 
Secure and Transparent Insurance Application using Blockchain Technology
Secure and Transparent Insurance Application using Blockchain TechnologySecure and Transparent Insurance Application using Blockchain Technology
Secure and Transparent Insurance Application using Blockchain Technology
 
A typical analysis of hybrid covert channel using constructive entropy analy...
A typical analysis of hybrid covert channel using constructive  entropy analy...A typical analysis of hybrid covert channel using constructive  entropy analy...
A typical analysis of hybrid covert channel using constructive entropy analy...
 
Blind multi-signature scheme based on factoring and discrete logarithm problem
Blind multi-signature scheme based on factoring and discrete logarithm problemBlind multi-signature scheme based on factoring and discrete logarithm problem
Blind multi-signature scheme based on factoring and discrete logarithm problem
 
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTSA SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
 
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTSA SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
 
A Systematic Mapping Study on Current Research Topics in Smart Contracts
A Systematic Mapping Study on Current Research Topics in Smart ContractsA Systematic Mapping Study on Current Research Topics in Smart Contracts
A Systematic Mapping Study on Current Research Topics in Smart Contracts
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

N33066069

  • 1. Rajasree R.S., Sonali Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.066-069 66 | P a g e Fair Contract Signing Protocol Based On Secret Sharing Rajasree R.S., Sonali Patil Department Of Computer Engineering Pimpri Chinchwad College Of Engineering,Nigdi,Pune-44 ABSTRACT A fair contract signing protocol allows two potentially mistrusted parties to exchange their commitments to an agreed contract over the Internet in a fair way so that either each of them obtains the others signature or neither party does. The existing protocols face the problem of more number of transactions in between TTP and party. Also the time complexity and compu- tational complexities are more. In this paper we are proposing a fair contract signing protocol based on secret sharing scheme. The proposed method satisfies property of abuse freeness and fairness. That is if the protocol is executed unsuc- cessfully, none of the two parties can show the validity of intermediate results to others. The proposed scheme is more reliable, secure and less complex . Keywords: Contract signing, Secret Sharing, Visual Cryptography 1. Introduction Contract signing plays a very important role in any business transaction, in particular in situations where the involved parties do not trust each other to some extent already. Contract signing is truly simple due to the existence of “simultaneity.” That is, both parties generally sign two hard copies of the same contract at the same place and at the same time. After that, each party keeps one copy as a legal document that shows both of them have com- mitted to the contract. If one party does not abide by the contract, the other party could provide the signed contract to a judge in court. As electronic commerce is becoming more and more important and popular in the world, it is desirable to have a mechanism that allows two parties to sign a digital contract via the Internet.However; the problem of contract signing becomes difficult in this setting, since there is no simultaneity any more in the scenario of computer networks. In other words, the simultaneity has to be mimicked in order to design a digital contract- signing protocol. Information is exchanged in com- puter networks nonsimultaneously, so at least an unfair state must be passed through. From the view point of technique, the problem of digital contract signing belongs to a wider topic: fair exchange. Ac- tually, fair exchange includes the following different but related issues: contract-signing protocols, certi- fied e-mail systems nonrepudiation protocols and e- payment schemes in electronic commerce .In this paper, the problem of digital contract signing be- tween two parties is focused. Since a party‟s com- mitment to a digital contract is usually defined as his/her digital signature on the contract, digital con- tract signing is essentially implied by fair exchange of digital signatures between two potentially mi- strusted parties. There is a rich history of contract signing (i.e., fair exchangeof digital signatures) be- cause this is a fundamental problem in electronic transactions. 2. Existing System According to the involvement degree of a trusted third party (TTP), contract-signing protocols can be divided into three types: 1) gradual exchanges without any TTP; 2) protocols with an on-line TTP[1]; and 3) protocols with an off-line TTP. Early efforts mainly focused on the first type of protocols to meet computational fairness: Both parties ex- change their commitments/secrets “bit-by-bit.”If one party stops prematurely, both parties have about the same fraction of the peer‟s secret, which means that they can complete the contract off-line by investing about the same amount of computing work, e.g., exclusively searching the remaining bits of the se- crets. The major advantage of this approach is that no TTP is involved. However, this approach is unrealistic for most real-world applications due to the following reasons. First of all, it is assumed that the two parties have equivalent or related computa- tion resources. Otherwise, such a protocol is favora- ble to the party with stronger computing power, who may conditionally force the other party to commit the contract by its own interest. At the same time, such protocols are inefficient because the costs of computation and communication are extensive. In addition, this approach has the unsatisfactory proper- ty of uncertain termination. In the second type of fair exchange protocols an on-line TTP is always in- volved in every exchange. In this scenario TTP is essentially a mediator: a) Each party first sends his/her item to the TTP; b) then, the TTP checks the validity of those items; c) if all expected items are correctly received, the TTP finally forwards each item to the party who needs it. Contract-signing pro- tocols with an on-line TTP could be designed more easily since the TTP facilitates the execution of each exchange, but may be still expensive and inefficient because the TTP needs to be paid and must be part of every execution.
  • 2. Rajasree R.S., Sonali Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp. 67 | P a g e 2.1 RSA Cryptosystem Existing system use the RSA crypto system [8]and is now the de facto industrial standard. Alice sets an RSA modulus n=pq whwre p and q are two safe k bit primes and sets her public key e ЄR Z* Ф(n), and calculates her private key d=e -1 modФ(n) (1) where modФ(n) is Euler‟s totient function. Then, she registers her public key with a certification au- thority (CA) to get her certificate .After that, Alice randomly splits d into d1 and d2 so that d=d1+d2, where e ЄR Z* Ф(n). To get a voucher VA from a TTP, Alice is required to send (CA,e 1,d 2)to the TTP, where e1=d1 -1 modФ(n) (2) The voucher is the TTP‟s signature that implicitly shows two facts: 1)e1 can be used to verify a partial signature gen- erated by using secret key d1, and 2) the TTP knows a secret d2 matches with RSA key pairs (d1,e1)and (d,e) .When Alice and Bob want to exchange their signatures on a message m, Alice first computes µ1=h(m)d1mod n (3) and sends (CA,VA,µ 1) to Bob, where h(.)is a se- cure hash function.Upon receiving , Bob checks the validity of CAand VA, and whether h(m)=µ1 e1 mod n. If all those verificationsgo through, Bob returns his signature µ B to Alice, since he is convinced that the expected µ2=h(m)d2 mod n (4) can be revealed by Bob or the TTP. After receiv- ing valid µB Alice reveals µ2=h(m)d2 mod n to Bob. Finally, Bob obtains Alice‟signature µ A for mes- sage by setting , µA= µ 1µ 2since we have h(m)ΞµA e =h(m)(d1+d2)e =h(m)de mod n. (5) The security problem in Park „sscheme [9]is that an honest-but-curious TTP can easily derive Alice‟s private key d.The reason is that with the knowledge of (n,e,e1,d2), the TTP knows that the integer e-(1-ed 2)e 1 is a nonzero multiple ofФ(n). It is well known that knowing such a multiple of Ф(n),Alice‟s RSA modulus n can be easily factored. Consequently, the TTP can get Alice‟s private key by the extended Euclidean algorithm. [5] In rsa based solution is there for fair contract signing ,The protocol is based on an RSA multisig- nature, which is formally proved to be secure .This protocol is fair and optimistic. Furthermore, different from the above existing schemes,theprotocol is abuse-free.But the existing system does not suit for multi party signature,whwre only a single TTP and two users can exchange their signatures 3 PROPOSED SYSTEM This paper proposes a new secure method for fair contract signing. The protocol method is based on secret sharing[6], [7].The first step in ex- changing the signatures is Registration with the TTP.The following is the registration protocol that register the users with the TTP. 3.1 REGISTRATION PROTOCOL To use our protocol for exchanging digital signa- tures,both Alice and Bob has to register with the TTP. 1) Alice and Bob registers their public key with a CA to get their certificate CA 2) Then Both Alice and Bob sends their CA to the TTP to register with the TTP. 3) The TTP first checks that A certificate CA is valid.If the certificates are valid TTP sends a long term voucher Va to both the users.Va is TTP,s signature on the contract The above registration protocol is little bit compli- cated .But this is to be done only once for a long period of time. . The parties uses (2, 2) secret sharing [7] for con- structng the 2 shares of their signature. The method is divided into 3 steps: a. Construction of shares of signature b. Distribution of shares c. Reconstruction of signature a. Construction of shares of signature  The original signature image is considered as an input  Apply the (2, 2) visual cryptography [7] to crate the 2 shares for the signature image.  Both the parties will create 2 shares of their signatures. Shares of Bob share1 (SB1) share2 (SB2) Shares of Alice s Share 1 (SA1) Share 2 (SA2) b)Distribution of Shares
  • 3. Rajasree R.S., Sonali Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp. 68 | P a g e After the shares are constructed by both the par- ticipants the shares are to be distributed each other partialy.A partial share is given to the TTP also in- order to improve security. DisD Distribution Of Shares The above figure shows the distribution of shares After registering with the TTP both Alice and bob exchange their shres by the following steps 1)Alice and Bob first send one of their shares(SA1,SB1) to the TTP along with their vouch- ers(Va,Vb).They keep the other part of their shares (SA2,SB2) secret. 2)TTP then verifies the vouchers and stores their shares 3)Alice then sends the second part of her share(SA2) to Bob.On receiving the share ,Bob sends the second part of his share(SB2) to Alice 4)Now TTP can send the other part of their shares((SA1,SB1) to both Alice and Bob c. Reconstruction Of Shares 1)On receiving both the shares of Alice,Bob re- constructs the original share from it + =ALICE 2)On receiving both the share s of Bob,Alice recon- structs the original secret by stacking 2 shares to- gether. + =BOB Our protocol guarantees the two parities involved to obtain or not obtain the other‟s signature simulta- neously.This property implies that even a dishonest party who tries to cheat cannot get an advantage over the other. 4. Properties 1)Abuse-Freeness If the whole protocol is not finished suc- cessfully,any of the two parties cannot show the va- lidity of the intermediate results generated by the other to an outsider,either during or after the proce- dure where those intermediate results are produced. 2)Timely Termination: The execution of a protocol instance will be terminated in a predetermined time. This property is implemented by adding a reasonable deadline in a contract. If one party does not send his/her signature to the other party after the deadline , both of them are free of liability to their partial commitments to the contract and do not need to wait any more. 3) Compatibility: In our protocol, each party‟s commitment to a contract is a standard digital signature. This means that to use the protocol in existing systems, there is no need to modify the signature scheme or message forma at all. Thus, it will be very convenient to inte- grate the contract-signing protocol into existing software for electronic transactions. 4) High Performance: In a typical implementation, the protocol execution in a normal case requires only interaction of several rounds between two parties, transmission of about one thousand bytes of data, and computa- tion of a few modular exponentiations by each party. CONCLUSION The proposed scheme reduces the computa- tional complexities by avoiding the use of complex equations with secret sharing algorithm. The (2, 2) secret sharing algorithm is very simple, less complex and reduces the number of transactions in between TTP and party. The proposed scheme can be easily extended for n participants using (n, n) secret sharing. Also number of TTPs can be increased. References [1] Abadi, N. Glew, B. Horne, and B. Pinkas, “Certified e-mail with a light on-line trusted third party: Design and implementation,” in Proc.2002 Int.World Wide Web Conf. (WWW‟02), 2002, pp. 387–395, ACM Press. [2] N. Asokan, V. Shoup, and M. Waidner, “Optimistic fair exchange of digital signa- tures,” in Proc. EUROCRYPT‟98, 1998, vol. 1403, LNCS, pp. 591–606, Springer- Verlag. [3] N. Asokan, V. Shoup, and M. Waidner, “Optimistic fair exchange of digital signa- tures,” IEEE J. Sel. Areas Commun., vol. 18, no. 4, pp.591–606, Apr. 2000.
  • 4. Rajasree R.S., Sonali Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp. 69 | P a g e [4] G. Ateniese, “Efficient verifiable encryp- tion (and fair exchange) of digital signa- ture,” in Proc. ACMConf. Computer and Communications Security [5] Rajasree R. S., “RSA based solution for fair contracr signing” International Journal of Engineering Research and Technology, Vol. 1, Issue 8. [6] A. Shamir, “How to share a secret,” Com- munications of the ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979. [7] M. Naor, A. Shamir, “Visual cryptogra- phy”, Proc. Eurocrypt ‟94, Lecture Notes Computer Sci., Vol. 950, pp.1-12, 1994. [8] R.L.Rivest ,A.Shamir and L.Adleman ,”Amethod for obtaining digital signature and public-key crypto- system”,commun.ACM,vol.21 no.2 ,pp. 120-126,Feb.1978 [9] J.M.Park,E.Chhong ,H.J. Siegel and I.Ray ,”Constructing fair exchange for e- commerce via distributed computation of RSA signatures” in Proc.PODC ,2003 ,pp172-181,ACM press