Home   Coordinates   PGP Key   Teaching   Research   Personal Stuff  


Fair Exchange and Non-Repudiation Bibliography



  • Martín Abadi and Bruno Blanchet. Computer-assisted verification of a protocol for certified email. In Radhia Cousot, editor, Static Analysis, 10th International Symposium (SAS'03), volume 2694 of Lecture Notes in Computer Science, pages 316-335, San Diego, California,USA, June 2003. Springer-Verlag.

  • Martín Abadi, Neal Glew, Bill Horne, and Benny Pinkas. Certified email with a light on-line trusted third party: Design and implementation. In Arun Iyengar and Dave De Roure, editors, Proceedings of the Eleventh International World Wide Web Conference, pages 387-395, Honolulu, Hawaii, May 2002. ACM.

  • N. Asokan, Matthias Schunter, and Michael Waidner. Optimistic protocols for multi-party fair exchange. Research Report RZ 2892 (# 90840), IBM Research, December 1996.

  • N. Asokan, Matthias Schunter, and Michael Waidner. Optimistic protocols for fair exchange. In Tsutomu Matsumoto, editor, 4th ACM Conference on Computer and Communications Security, pages 8-17, Zurich, Switzerland, April 1997. ACM Press.

  • N. Asokan, Birgit Baum-Waidner, Matthias Schunter, and Michael Waidner. Optimistic synchronous multi-party contract signing. Research Report RZ 3089, IBM Research Division, December 1998.

  • N. Asokan, Victor Shoup, and Michael Waidner. Asynchronous protocols for optimistic fair exchange. In IEEE Symposium on Research in Security and Privacy, pages 86-99, Oakland, CA, May 1998. Technical Committee on Security and Privacy, IEEE Computer Society Press.

  • N. Asokan, Victor Shoup, and Michael Waidner. Optimistic fair exchange of digital signatures. In Advances in Cryptology---Eurocrypt 1998, volume 1403 of Lecture Notes in Computer Science, pages 591-606, 1998.

  • N. Asokan, Victor Shoup, and Michael Waidner. Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications, 18(4):593-610, April 2000.

  • N. Asokan. Fairness in Electronic Commerce. PhD thesis, University of Waterloo, May 1998.

  • Giuseppe Ateniese, Breno de Medeiros, and Michael T. Goodrich. TRICERT: A distributed certified E-mail scheme. In Symposium on Network and Distributed Systems Security (NDSS 2001), San Diego, CA, February 2001. Internet Society.

  • Giuseppe Ateniese. Efficient verifiable encryption (and fair exchange) of digital signatures. In 6th ACM Conference on Computer and Communications Security (CSS 1999), pages 138-146, Singapore, November 1999. ACM Press.

  • Alireza Bahreman and Doug Tygar. Certified electronic mail. In Symposium on Network and Distributed Systems Security, pages 3-19. Internet Society, February 1994.

  • Feng Bao, Robert H. Deng, and Wenbo Mao. Efficient and practical fair exchange protocols with off-line TTP. In IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy, pages 77-85. IEEE Computer Society,Technical Committee on Security and Privacy, IEEE Computer Security Press, May 1998.

  • Feng Bao, Robert H. Deng, Khanh Quoc Nguyen, and Vijay Varadharajan. Multi-party fair exchange with an off-line trusted neutral party. In DEXA 1999 Workshop on Electronic Commerce and Security, Florence, Italy, September 1999.

  • Birgit Baum-Waidner and Michael Waidner. Round-optimal and abuse free optimistic multi-party contract signing. In Ugo Montanari, José D. P. Rolim, and Emo Welzl, editors, Automata, Languages and Programming --- ICALP 2000, volume 1853 of Lecture Notes in Computer Science, pages 524-535, Geneva, Switzerland, July 2000. Springer-Verlag.

  • Giampaolo Bella and Lawrence C. Paulson. Mechanical proofs about a non-repudiation protocol. In Richard J. Boulton and Paul B. Jackson, editors, Theorem Proving in Higher Order Logics, volume 2152 of Lecture Notes in Computer Science, pages 91-104. Springer-Verlag, 2001.

  • Michael Ben-Or, Oded Goldreich, Silvio Micali, and Ronald L. Rivest. A fair protocol for signing contracts. IEEE Transaction on Information Theory, 36(1):40-46, January 1990.

  • Manuel Blum. How to exchange (secret) keys. ACM Transactions on Computer Systems, 1(2):175-193, May 1983. Previously published in ACM STOC 1983 proceedings, pages 440-447.

  • Alexandre Boisseau. Abstractions pour la vérification de propriétés de sécurité de protocoles cryptographiques. PhD thesis, École Normale Supérieure de Cachan, September 2003.

  • Dan Boneh and Moni Naor. Timed commitments. In Advances in Cryptology---Crypto 2000, volume 1880 of Lecture Notes in Computer Science, pages 236-254. Springer-Verlag, 2000.

  • Colin Boyd and Ernest Foo. Off-line fair payment protocols using convertible signatures. In Advances in Cryptology---Asiacrypt 1998, volume 1514 of Lecture Notes in Computer Science, pages 271-285. Springer-Verlag, 1998.

  • Colin Boyd and Peter Kearney. Exploring fair exchange protocols using specification animation. In Joseph Pieprzyk, Eiji Okamoto, and Jennifer Seberry, editors, Information Security--International Workshop on Information Security, volume 1975 of Lecture Notes in Computer Science, Wollogong, Australia, December 2000. Springer-Verlag.

  • Levente Buttyán and Jean-Pierre Hubaux. Rational exchange --- a formal model based on game theory. In L. Fiege, G. Mühl, and U. Wilhelm, editors, Electronic Commerce, volume 2232 of Lecture Notes in Computer Science, pages 114-126, Heidelberg, Germany, 2001. Springer-Verlag.

  • Levente Buttyán, Jean-Pierre Hubaux, and Srdjan Capkun. A formal analysis of syverson's rational exchange protocol. In Steve A. Schneider, editor, 15th IEEE Computer Security Foundations Workshop, pages 193-205, Cape Breton, Nova Scotia, Canada, June 2002. IEEE Computer Society Press.

  • Levente Buttyán, Jean-Pierre Hubaux, and Srdjan Capkun. A formal model of rational exchange and its application to the analysis of syverson's protocol. Journal of Computer Security, 2003. Special Issue of selected papers from CSFW15. To appear.

  • Rohit Chadha, Max Kanovich, and Andre Scedrov. Inductive methods and contract-signing protocols. In Pierangela Samarati, editor, 8th ACM Conference on Computer and Communications Security, pages 176-185, Philadelphia, PA, USA, November 2001. ACM Press.

  • Rohit Chadha, John C. Mitchell, Andre Scedrov, and Vitaly Shmatikov. Contract signing, optimism, and advantage. In R. Amadio and D. Lugiez, editors, CONCUR 2003 --- Concurrency Theory, volume 2761 of Lecture Notes in Computer Science, pages 366-382, Marseille, France, September 2003. Springer-Verlag.

  • Rohit Chadha, Steve Kremer, and Andre Scedrov. Formal analysis of multi-party contract signing. In Workshop on Issues in the Theory of Security --- WITS'04, Barcelona, Spain, April 2004. To appear.

  • Liqun Chen. Efficient fair exchange with verifiable confirmation of signatures. In Advances in Cryptology---Eurocrypt 1998, volume 1514 of Lecture Notes in Computer Science, pages 286-299. Springer-Verlag, 1998.

  • Tom Coffey and Puneet Saidha. Non-repudiation with mandatory proof of receipt. ACM Computer Communication Review, 26, 1996.

  • Benjamin Cox, Doug Tygar, and Marvin Sirbu. NetBill security and transaction protocol. In USENIX Association, editor, First USENIX Workshop of Electronic Commerce, pages 77-88. USENIX, July 1995.

  • Ivan B. Damgard. Practical and provably secure release of a secret and exchange of signatures. In Andvances in Cryptology---Asiacrypt 1996, volume 1163 of Lecture Notes in Computer Science, pages 133-144. Springer-Verlag, 1997.

  • Robert H. Deng, Li Gong, Aurel A. Lazar, and Weiguo Wang. Practical protocols for certified electronic mail. Journal of Network and System Management, 4(3):279-297, 1996.

  • Shimon Even and Yacov Yacobi. Relations among public key signature systems. Technical Report 175, Technion, Haifa, Israel, March 1980.

  • Shimon Even, Oded Goldreich, and Abraham Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, June 1985.

  • Shimon Even. Protocol for signing contracts. In Allen Gersho, editor, Advances in Cryptology: A Report on Crypto 1981, pages 148-153, 1982.

  • Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, and Llorenç Huguet i Rotger. An efficient protocol for certified electronic mail. In Joseph Pieprzyk, Eiji Okamoto, and Jennifer Seberry, editors, Information Security--International Workshop on Information Security, volume 1975 of Lecture Notes in Computer Science, pages 237-248, Wollogong, Australia, December 2000. Springer-Verlag.

  • Matthew K. Franklin and Michael K. Reiter. Fair exchange with a semi-trusted third party. In 4th ACM Conference on Computer and Communications Security, pages 1-5. ACM Press, April 1997.

  • Matthew K. Franklin and Gene Tsudik. Secure group barter: Multi-party fair exchange with semi-trusted neutral parties. In Ray Hirschfeld, editor, Second Conference on Financial Cryptography (FC 1998), volume 1465 of Lecture Notes in Computer Science, pages 90-102, Anguilla, British West Indies, February 1998. International Financial Cryptography Association (IFCA), Springer-Verlag.

  • Juan A. Garay and Philip D. MacKenzie. Abuse-free multi-party contract signing. In Prasad Jayanti, editor, International Symposium on Distributed Computing, volume 1693 of Lecture Notes in Computer Science, pages 151-165, Bratislava, Slavak Republic, September 1999. Springer-Verlag.

  • Juan A. Garay, Markus Jakobsson, and Philip D. MacKenzie. Abuse-free optimistic contract signing. In Advances in Cryptology---Crypto 1999, volume 1666 of Lecture Notes in Computer Science, pages 449-466. Springer-Verlag, 1999.

  • Felix C. Gärtner, Henning Pagnia, and Holger Vogt. Approaching a formal definition of fairness in electronic commerce. In International Workshop on Electronic Commerce (WELCOM 1999), pages 354-359, Lausanne, Switzerland, October 1999. IEEE Computer Society Press.

  • Oded Goldreich. A simple protocol for signing contracts. In David Chaum, editor, Advances in Cryptology---Crypto 1983, pages 133-136. Plenum Press, August 1983.

  • Nicolás González-Deleito and Olivier Markowitch. Exclusion-freeness in multi-party exchange protocols. In 5th Information Security Conference, volume 2433 of Lecture Notes in Computer Science, pages 200-209. Springer-Verlag, September 2002.

  • Sigrid Gürgens, Carsten Rudolph, and Holger Vogt. On the security of fair non-repudiation protocols. In Colin Boyd and Wenbo Mao, editors, Information Security Conference (ISC 2003), volume 2851 of Lecture Notes in Computer Science, pages 193-207, Bristol, United Kingdom, October 2003. Springer-Verlag.

  • Yongfei Han. Investigation of non-repudiation protocols. In ACISP: Information Security and Privacy: Australasian Conference, volume 1172 of Lecture Notes in Computer Science, pages 38-47. Springer-Verlag, 1996.

  • Markus Jakobsson. Ripping coins for fair exchange. In Louis C. Guillou and Jean-Jacques Quisquater, editors, Advances in Cryptology---Eurocrypt 1995, volume 921 of Lecture Notes in Computer Science, pages 220-230. Springer-Verlag, May 1995.

  • Steve Kremer and Olivier Markowitch. A multi-party non-repudiation protocol. In 15th International Conference on Information Security---Sec 2000, IFIP World Computer Congress, pages 271-280, Beijing, China, August 2000. Kluwer Academic.

  • Steve Kremer and Olivier Markowitch. Optimistic non-repudiable information exchange. In J. Biemond, editor, 21st Symp. on Information Theory in the Benelux, pages 139-146, Wassenaar, The Netherlands, May 2000. Werkgemeenschap Informatie- en Communicatietheorie, Enschede.

  • Steve Kremer and Olivier Markowitch. Selective receipt in certified e-mail. In C. Pandu Rangan and Cunsheng Ding, editors, Advances in Cryptology---Indocrypt 2001, volume 2247 of Lecture Notes in Computer Science. Springer-Verlag, December 2001.

  • Steve Kremer and Olivier Markowitch. Fair multi-party non-repudiation. International Journal on Information Security, 1(4):223-235, July 2003.

  • Steve Kremer and Jean-François Raskin. A game-based verification of non-repudiation and fair exchange protocols. In Kim G. Larsen and Mogens Nielsen, editors, Concurrency Theory--CONCUR 2001, volume 2154 of Lecture Notes in Computer Science, pages 551-565, Aalborg, Denmark, August 2001. Springer-Verlag.

  • Steve Kremer and Jean-François Raskin. Game analysis of abuse-free contract signing. In Steve A. Schneider, editor, 15th IEEE Computer Security Foundations Workshop, pages 206-220, Cape Breton, Nova Scotia, Canada, June 2002. IEEE Computer Society Press.

  • Steve Kremer and Jean-François Raskin. A game-based verification of non-repudiation and fair exchange protocols. Journal of Compuiter Security, 11(3):399-429, 2003.

  • Steve Kremer, Olivier Markowitch, and Jianying Zhou. An intensive survey of non-repudiation protocols. Computer Communications, 25(17):1606-1621, November 2002.

  • Steve Kremer. Formal Analysis of Optimistic Fair Exchnage Protocols. PhD thesis, Université Libre de Bruxelles, Brussels, Belgium, December 2003.

  • Olivier Markowitch and Steve Kremer. A multi-party optimistic non-repudiation protocol. In Dongho Won, editor, 3rd International Conference on Information Security and Cryptology (ICISC 2000), volume 2015 of Lecture Notes in Computer Science, pages 109-122, Seoul, Korea, December 2000. Springer-Verlag.

  • Olivier Markowitch and Steve Kremer. An optimistic non-repudiation protocol with transparent trusted third party. In George Davida and Yair Frankel, editors, Information Security Conference 2001, volume 2200 of Lecture Notes in Computer Science, pages 363-378, Malaga, Spain, October 2001. Springer-Verlag.

  • Olivier Markowitch and Yves Roggeman. Probabilistic non-repudiation without trusted third party. In Second Conference on Security in Communication Networks 1999, Amalfi, Italy, September 1999.

  • Olivier Markowitch and Shahrokh Saeednia. Optimistic fair-exchange with transparent signature recovery. In 5th International Conference, Financial Cryptography 2001, Lecture Notes in Computer Science. Springer-Verlag, 2001.

  • Olivier Markowitch and Shahrock Saeednia. Cryptanalysis of the Wu-Varadharajan fair exchange protocol. Information Processing Letter, 87(3):169-171, August 2003.

  • Olivier Markowitch, Dieter Gollmann, and Steve Kremer. On fairness in exchange protocols. In Pil Joong Lee and Chae Hoon Lim, editors, 5th International Conference on Information Security and Cryptology (ICISC 2002), volume 2587 of Lecture Notes in Computer Science, pages 451-464, Seoul, Korea, November 2002. Springer-Verlag.

  • Olivier Markowitch. Les protocoles de Non-répudiation. PhD thesis, Université Libre de Bruxelles, January 2001.

  • Silvio Micali. Certified E-mail with invisible post offices. Available from author; an invited presentation at the RSA 1997 conference, 1997.

  • John Mitsianis. A new approach to enforcing non-repudiation of receipt. Manuscript, 2001.

  • Moni Naor and Kobbi Nissim. Certificate revocation and certificate update. In 7th USENIX Security Symposium (SECURITY 1998), pages 217-228. Usenix Association, January 1998.

  • Aleksandra Nenadic and Ning Zhang. Fair and non-repudiable e-commerce in distributed networks. In Proceedings of 3rd Annual Network Symposium PGNet 2002, pages 180-185, Liverpool, UK, 2002.

  • Aleksandra Nenadic and Ning Zhang. Non-repudiation and fairness in electronic data exchange. In Proceedings of 5th International Conference on Enterprise Information Systems (ICEIS), pages 55-62, Angers, France, 2003.

  • Aleksandra Nenadic and Ning Zhang. On the design of the fair integrated data exchange system (FIDES). In Proceedings of IADIS International Conference e-Society, Lisbon, Portugal, 2003.

  • Aleksandra Nenadic and Ning Zhang. Enterprise Information Systems V book, chapter Non-repudiation and Fairness in Electronic Data Exchange. Kluwer, 2004. To appear.

  • Aleksandra Nenadic, Ning Zhang, and Stephen K. Barton. Fair certified e-mail delivery. In Proceedings of the 9th ACM Symposium on Applied Computing (SAC 2004) - Computer Security Track, Nicosia, Cyprus, 2004. To appear.

  • Aleksandra Nenadic, Ning Zhang, and Stephen K. Barton. Security protocol for certified e-goods delivery. In Proceedings of International Conference on Information Technology, Coding and Computing (ITCC 2004) - Information Assurance and Security Track, Las Vegas, Nevada, USA, 2004. IEEE Computer Society. To appear.

  • Gethin Norman and Vitaly Shmatikov. Analysis of probabilistic contract signing. In Formal Aspects of Security, 2002.

  • Tatsuaki Okamoto and Kazuo Otha. How to simultaneously exchange secrets by general assumptions. In Second ACM Conference on Computer and Communications Security, pages 184-192, Zurich, Switzerland, 1994. ACM Press.

  • Jose Onieva, Jianying Zhou, Mildrey Carbonell, and Javier Lopez. A multi-party non-repudiation protocol for exchange of different messages. In 18th IFIP International Information Security Conference, Athens, Greece, May 2003. Kluwer.

  • Henning Pagnia and Felix C. Gärtner. On the impossibility of fair exchange without a trusted third party. Technical Report TUD-BS-1999-02, Darmstadt University of Technology, Department of Computer Science, Darmstadt, Germany, March 1999.

  • Henning Pagnia, Holger Vogt, and Felix C. Gärtner. Fair exchange. The Computer Journal, 8(2):55-75, January 2003.

  • Birgit Pfitzmann, Matthias Schunter, and Michael Waidner. Optimal efficiency of optimistic contract signing. In Seventeenth Annual ACM Symposium on Principles of Distributed Computing, pages 113-122, New York, May 1998. ACM.

  • Michael O. Rabin. Transaction protection by beacons. Journal of Computer and System Sciences, 27(2):256-267, October 1983.

  • James Riordan and Bruce Schneier. A certified E-mail protocol. In 14th Annual Computer Security Applications Conference. ACM, 1998.

  • Shahrokh Saeednia, Olivier Markowitch, and Yves Roggeman. Identity-based optimistic fair exchange with transparent signature recovery. In 9th International Conference on Distributed Multimedia Systems (DMS 2003), Miami, USA, September 2003.

  • Matthias Schunter. Optimistic Fair Exchange. PhD thesis, Technische Fakultät der Universität des Saarlandes, Saarbrücken, October 2000.

  • Vitaly Shmatikov and John Mitchell. Analysis of a fair exchange protocol. In Symposium on Network and Distributed Systems Security (NDSS 2000), pages 119-128, San Diego, CA, February 2000. Internet Society.

  • Vitaly Shmatikov and John Mitchell. Analysis of abuse-free contract signing. In Financial Cryptography 2000, volume 1962 of Lecture Notes in Computer Science, pages 174-191, Anguilla, British West Indies, February 2000. Springer-Verlag.

  • Vitaly Shmatikov and John Mitchell. Finite-state analysis of two contract signing protocols. Theoretical Computer Science, special issue on Theoretical Foundations of Security Analysis and Design, 283(2):419-450, 2002.

  • Paul Syverson. Weakly secret bit commitment: Applications to lotteries and fair exchange. In 11th IEEE Computer Security Foundations Workshop, June 1998.

  • Tom Tedrick. How to exchange half a bit. In David Chaum, editor, Advances in Cryptology---Crypto 1983, pages 147-151. Plenum Press, August 1983.

  • Tom Tedrick. Fair exchange of secrets. In G. R. Blakley and D. C. Chaum, editors, Advances in Cryptology---Crypto 1984, volume 196 of Lecture Notes in Computer Science, pages 434-438. Springer-Verlag, 1985.

  • Holger Vogt, Henning Pagnia, and Felix C. Gärtner. Modular fair exchange protocols for electronic commerce. In 15th Annual Computer Security Applications Conference, pages 3-11, Phoenix, Arizona, December 1999. IEEE Computer Society Press.

  • Holger Vogt. Asynchronous optimistic fair exchange based on revocable items. In Financial Cryptography 2003, Lecture Notes in Computer Science, Gosier, Guadeloupe, January 2003. Springer-Verlag.

  • Chuan-Kun Wu and Vijay Varadharajan. Fair exchange of digital signatures with off-line trusted third party. In Sihan Qing, Tatsuaki Okamoto, and Jianying Zhou, editors, Information and Communications Security, volume 2229 of Lecture Notes in Computer Science, pages 466-470, Xian, China, November 2001. Springer-Verlag.

  • Cheng-Hwee You, Jianying Zhou, and Kwok-Yan Lam. On the efficient implementation of fair non-repudiation. Computer Communication Review, 28(5):50-60, October 1998.

  • Ning Zhang and Qi Shi. Achieving non-repudiation of receipt. The Computer Journal, 39(10):844-853, 1996.

  • Jianying Zhou and Robert H. Deng. On the validity of digital signatures. Computer Communication Review, 30(2):29-34, April 2000.

  • Jianying Zhou and Dieter Gollmann. Certified electronic mail. In Computer Security --- ESORICS 1996, volume 1146 of Lecture Notes in Computer Science, pages 160-171, 1996.

  • Jianying Zhou and Dieter Gollmann. A fair non-repudiation protocol. In IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy, pages 55-61. IEEE Computer Society,Technical Committee on Security and Privacy, IEEE Computer Security Press, May 1996.

  • Jianying Zhou and Dieter Gollmann. An efficient non-repudiation protocol. In 10th IEEE Computer Security Foundations Workshop, pages 126-132. IEEE Computer Society Press, June 1997.

  • Jianying Zhou and Dieter Gollmann. Evidence and non-repudiation. Journal of Network and Computer Applications, 20:267-281, 1997.

  • Jianying Zhou and Dieter Gollmann. Towards verification of non-repudiation protocols. In International Refinement Workshop and Formal Methods Pacific, pages 370-380, Canberra, Australia, September 1998. Springer-Verlag.

  • Jianying Zhou and Kwok-Yan Lam. Securing digital signatures for non-repudiation. Computer Communications, 22(8):710-716, May 1999.

  • Jianying Zhou, Robert H. Deng, and Feng Bao. Evolution of fair non-repudiation with TTP. In ACISP: Information Security and Privacy: Australasian Conference, volume 1587 of Lecture Notes in Computer Science, pages 258-269. Springer-Verlag, 1999.

  • Jianying Zhou, Robert H. Deng, and Feng Bao. Some remarks on a fair exchange protocol. In International Workshop on Practice and Theory in Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, pages 46-57. Springer-Verlag, January 2000.

  • Jianying Zhou. Non-repudiation. PhD thesis, University of London, December 1996.

  • Jianying Zhou. Non-repudiation in electronic commerce. Computer Security Series. Artech House, August 2001.