Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Computer Research and Development》 2003-04
Add to Favorite Get Latest Update

A Protocol for Signing Contracts Based on Oblivious Transfer

QU Ya Dong 1,2 , HOU Zi Feng 2, and WEI Wei 2 1(Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080) 2(Legend Corporate Research & Development, Beijing 100085)  
If two parties want to sign a contract C over a communication network, they must “simultaneously” exchange their commitments to C Since simultaneous exchange is usually impossible in practice, protocols are needed to approximate simultaneity by exchange partial commitments in a piece by piece manner The party of secondly sending commitments may have a slight advantage; a “fair” protocol must keep this advantage within acceptable limits The protocol for signing a contract is improved based on the research result of secure multiparty computation In this protocol, the parties obliviously transfer the signed bit and the committed bit; the other parties can prove the validity of this bit based on the confirming sub protocol, but he can't gain more information about the whole signature by accumulating the signed bit or the committed bit After the parties exchange the whole signed information, they declare the commitment about the signature respectively, and gain the whole signature of the other party At this moment, the party doesn't care about the advance quit of the other party, because he has gained the whole signed information Finally, it is proved that this protocol is quit fairness
【Fund】: 国家自然科学基金重大项目 (698962 5 0 5 )
【CateGory Index】: TP393.04
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 CHEN Zhi-de 1,2,3 , ZHU Hong 1,2 1 (Computer Science and Engineering Department,Fudan University,Shanghai 200433,China) 2 (Key Laboratory of Intelligent Information Processing,Fudan University,Shanghai 200433,China) 3 (School of Mathematics and Computer Science,Fujian Normal University,Fuzhou 350007,China);Construction of m-out-of-n Oblivious Transfer[J];Journal of Chinese Computer Systems;2006-03
Chinese Journal Full-text Database 1 Hits
1 JIANG Xiao Ning, YE Cheng Qing, and PAN Xue Zeng (Department of Computer Science & Engineering, Zhejiang University, Hangzhou 310027);FAIR EXCHANGE PROTOCOLS WITH OFF-LINE SEMI-TRUSTED THIRD PARTY[J];Journal of Computer Research and Development;2001-04
Chinese Journal Full-text Database 10 Hits
1 ZHANG Fu-tai 1,ZHAO Fu-xiang 2, WANG Yu-min 2 (1.School of Mathematics and Computer Science,Nanjing Normal University,Nanjing,Jiangsu,210097,China; 2.Key Lab.On ISN,Xidian University,Xi'an,Shaanxi,710071,China);Verifiable Secret Sharing and Its Applications[J];Acta Electronica Sinica;2002-10
2 Li Yan-ping Zhang Jian-zhong (College of Mathematics and Info. Sci., Shaanxi Normal Univ., Xi'an 710062, China);A New Fair Multi-party Exchange Protocol[J];Journal of Electronics and Information Technology;2004-08
3 ZHONG Hong1,LI Jiang-hua1,FANG Xing1,YU Yue2(1.Key Lab.of Intelligent Computing & Signal Processing,Ministry of Education,Anhui University,Hefei 230039,China;2.School of Computer Science and Technology,Anhui Technology University,Maanshan 234002,China);A key management plan based on verifiable secret sharing scheme[J];Electronic Design Engineering;2009-06
4 ZHANG Fu-Tai① and WANG Yu-Min② ①(College of Mathematics Computer Science, Nanjing, Normal University, Nanjing 210097) ②(Key Laboratory on ISN, Xidian University, Xi'an 710071);AN UNCONDITIONAL SECURE GENERAL VERIFIABLE SECRET SHARING PROTOCOL[J];Journal of Computer Research and Development;2002-10
5 Liu Dongmei1,3,Qing Sihan1,2,Ma Hengtai4,and Li Shuren51(National Engineering Research Center for Fundamental Software,Institute of Software,Chinese Academy of Sciences,Beijing 100190)2(School of Software and Microelectronics,Peking University,Beijing 102600)3(Graduate University of Chinese Academy of Sciences,Beijing 100049)4(National Key Laboratory of Integrated Information System Technology,Chinese Academy of Science,Beijing 100190)5(Computer Network Information Center,Chinese Academy of Sciences,Beijing 100190);A Kind of Analysis Method of Off-Line TTP Fair Non-Repudiation Protocol[J];Journal of Computer Research and Development;2011-04
6 XIAO Hai-yan1,ZHANG Min-qing1,YANG Xiao-yuan1,2,ZHOU Xuan-wu11.Key Laboratory of Network & Information Security of APF,Engineering College of APF,Xi’an 710086,China 2.Key Laboratory of Network & Information Security of the Ministry of Education,Xidian University,Xi’an 710071,China;Fair exchange protocol based on concurrent signature[J];Computer Engineering and Applications;2009-23
7 DONG Bin1,ZHANG Min-qing1,YANG Xiao-yuan1,2,ZHOU Xuan-wu1 1.Key Laboratory of Network & Information Security of APF,Engineering College of APF,Xi'an 710086,China 2.Key Laboratory of Network & Information Security of the Ministry of Education,Xidian University,Xi'an 710071,China;Fair exchange protocol with off-line semi-trusted third party[J];Computer Engineering and Applications;2009-35
8 LIU Wen-yuan ZHANG Shuang ZHANG Jiang-xiao(Information Science and Engineering Institute,Yanshan University,Qinhuangdao 066004,China);Fair Contract Signing Protocol Based on Publicly Verifiable Secret Sharing[J];Computer Science;2009-02
9 ZHANG Futai(College of Mathematics and Computer Science,Nanjing Normal University,Nanjing 210097);Fair Exchange Protocol with Distributed Semi-trusted Third Party[J];Computer Engineering;2006-03
10 DU Hong-zhen~(1,2),ZHANG Jian-zhong~1(1.College of Mathematics & Information Science,Shanxi Normal University,Xi'an Shanxi 710062,China;2.Dept.of Mathematics,Baoji School,Baoji Shanxi 721007,China);New Multi-party Fair Exchange Protocol with Off-line Semi-trusted Third Party[J];Application Research of Computers;2006-08
China Proceedings of conference Full-text Database 1 Hits
1 Li Mong Dong , Yang Yi Xian (Information Security Center. Beijing Univ. of Posts and Telecomm. Beijing 100876);A Scheme of Fair Exchange of Signatures Based on bilinear Aggregate signatures[A];[C];2004
Chinese Journal Full-text Database 10 Hits
1 ZHANG Sheng~1,XU Guo-ai~1,HU Zheng-ming~1,YANG Yi-xian~1,ZHOU Xi-zeng~2(1. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China; 2. Yuanze University of Taiwan, Taiwan 000320, China);A Mobile IP Authentication Protocol Based on Identity[J];Journal of Beijing University of Posts and Telecommunications;2005-03
2 LV Ting-jie(School of Economics & Management,BUPT,Beijing 100876,China);An analysis and prospect of the developing trend of the mobile trade in China[J];Journal of Beijing University of Posts and Telecommunications(Social Sciences Edition);2006-04
3 WANG Yu-jing (International Trade Department,Tianjin University of Commerce,Tianjing 300134,China);Electronic Commerce in China:Development and Strategy[J];Commercial Research;2002-05
4 WANG Hua-li (Economy and Management College of Xinjiang Agriculture University, Urumqi Xinjiang);The Strategy of Developing Chinese Electronic Commerce[J];Commercial Research;2004-18
5 TONG Guang-cai(School of Finance and Economics,Chongqing Jiaotong University,Chongqing 400074,China);On Solutions to the Disputes between Cardholders and Merchants in SET Protocol[J];Journal of Chongqing Institute of Technology(Natural Science);2009-05
6 ZHANG Jing-liang1,2,MA Li-zhen3,and WANG Yu-min1 (1. State Key Laboratory of Integrated Service Networks,Xidian University Xi’an 710071; 2. Department of Mathematics,Ocean University of China Qingdao Shandong 266071; 3. Department of Physics,Ocean University of China Qingdao Shandong 266100);Transformation of 1-out-of-n Oblivious Transfer and Its Application[J];Journal of University of Electronic Science and Technology of China;2008-06
7 YAN Hui-juan,LIN Guo-shun(Economy & Management College,Dalian Maritime Univ.,Dalian 116026,China);Improved algorithm of dynamic secret sharing schemes based on Hash function[J];Journal of Dalian Maritime University;2006-01
8 YANG Guo-ming (Liaoning financial Vocational College,Shenyang 110122,China);Mobile Payment Business Model Analysis[J];Computer Knowledge and Technology;2006-20
9 LIANG Jing-jing (School of Computer and Information Technology, Nanyang Normal University, Nanyang 473061, China);Security Techniques in E-Business[J];Computer Knowledge and Technology;2009-12
10 ZHANG An-qin(School of Computer and Information Engineering,Shanghai University of Electric Power,Shanghai 200090,China);Summary of Mobile Payment Technique[J];Journal of Shanghai University of Electric Power;2006-02
【Secondary References】
Chinese Journal Full-text Database 2 Hits
1 Zong Qianjin Shen Hongzhou Yuan Qinjian School of Information Management,Nanjing University,Nanjing 210093;Visual Analysis of Mobile Commerce Researches in China[J];Library and Information Service;2012-10
2 YANG Guang;Basic Teaching and Research Department,Party School of CPC Fujian Provincial Party Committee;;Design and Implementation of the Secure Exchange System for the Electronic Official Documents Based on the Digital Envelope Technology[J];Journal of Putian University;2013-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved