A Survey on Optimistic Fair Digital Signature Exchange Protocols
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
Security services become crucial to many applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery, with the phenomenal growth of the Internet and open networks. For these applications fair exchange must be assured. A fair protocol allows two parties to exchange digital signatures over the Internet in a fair way, so that either each party gets the other’s signature, or neither party does. This paper, gives a survey on the most important fair and optimistic digital signature exchange protocols. Optimistic, means the third trusted party (TTP) is involved only in the situations where one party is cheating or the communication channel is interrupted, i.e., TTP is offline. As more business is conducted over the Internet, the fair-exchange problem is gaining greater importance. This paper also provides an analysis of basic features, security, and efficiency of digital signature exchange protocols.
Authors and Affiliations
Alfin Abraham , Vinodh Ewards , Harlay Maria Mathew
Comparative BER Performance of M-ary QAM-OFDM System in AWGN & Multipath Fading Channel
OFDM (Orthogonal Frequency Division Multiplexing) is a multicarrier technique where linearly modulated data streams are divided into number of substreams each occupying a bandwidth less than the total bandwidth of the si...
Quantitative evaluation of Segmentation algorithms based on level set method for ISL datasets
The enormous potential research efforts have been taken for sophisticated and natural human computer interaction using gestures. This work has got motivated from long ago as 1980’s since sign language is the only communi...
Interference Reduction Technique in WCDMA using Cell Resizing
In WCDMA, the interference is produced by different factors such as thermal noise, intra cell traffic, traffic in adjacent cells and external traffic. In addition, the increase in number of users in a cell consequently i...
A note on Quantum Cryptography
Cryptography provides security for the information and personal details. The combination of 3AQKDP (implicit) and 3AQKDPMA (explicit) quantum cryptography is used to provide authenticated secure communication between sen...
Efficient Block Truncation Coding
Block Truncation Coding (BTC) is one of the lossy image ompression techniques. The computational complexity involved in this method is very simple. In the proposed method, the feature of inter-pixel correlation is explo...