Abuse-freeness in contract signing: a blockchain-based proposal

JL Ferrer-Gomila, MF Hinarejos - International Journal of Information …, 2024 - Springer
Electronic contract signing requires the design of protocols that guarantee that the exchange
is fair. In the past 5 years, we have observed that trusted third parties (TTPs) can be replaced …

A Hard-Timeliness Blockchain-Based Contract Signing Protocol

JL Ferrer-Gomila, MF Hinarejos - Computers, 2023 - mdpi.com
In this article, we present the first proposal for contract signing based on blockchain that
meets the requirements of fairness, hard-timeliness, and bc-optimism. The proposal, thanks …

Fairness in non-repudiation protocols

W Jamroga, S Mauw, M Melissen - … , Denmark, June 27-28, 2011, Revised …, 2012 - Springer
We indicate two problems with the specifications of fairness that are currently used for the
verification of non-repudiation and other fair-exchange protocols. The first of these problems …

Constructing optimistic multi-party contract signing protocols

B Kordy, S Radomirovic - 2012 IEEE 25th Computer Security …, 2012 - ieeexplore.ieee.org
We give an explicit, general construction for optimistic multi-party contract signing protocols.
Our construction converts a sequence over any finite set of signers into a protocol …

On the efficiency of multi-party contract signing protocols

G Draper-Gil, JL Ferrer-Gomila, MF Hinarejos… - … Conference, ISC 2015 …, 2015 - Springer
This paper presents an efficiency study of fair exchange protocols for Multi-Party Contract
Signing (MPCS) from their architecture point of view, an approach that has not been …

Design and formal verification of a CEM protocol with transparent TTP

Z Liu, J Pang, C Zhang - Frontiers of Computer Science, 2013 - Springer
In certified email (CEM) protocols, trusted third party (TTP) transparency is an important
security requirement which helps to avoid bad publicity as well as protecting individual …

Game-based verification of contract signing protocols with minimal messages

Y Zhang, C Zhang, J Pang, S Mauw - Innovations in Systems and Software …, 2012 - Springer
A multi-party contract signing (MPCS) protocol is used for a group of signers to sign a digital
contract over a network. We analyse the protocols of Mauw, Radomirović and Torabi Dashti …

[图书][B] Game theory and logic for non-repudiation protocols and attack analysis

M Melissen - 2013 - satoss.uni.lu
Research in security has traditionally focused on preventing all possible attacks, without
focusing on the attacker and defender, and their incentives, abilities, and knowledge …

Verification of a key chain based ttp transparent cem protocol

Z Liu, J Pang, C Zhang - Electronic Notes in Theoretical Computer Science, 2011 - Elsevier
In certified email (CEM) protocols, TTP transparency is an important security requirement
which helps to avoid bad publicity as well as protecting individual usersʼ privacy. Recently …

[PDF][PDF] PG Scholar, CSED, Dr. APJ Abdul Kalam University Indore, MP, India Assistant Professor, CSED, Dr. APJ Abdul Kalam University Indore, MP, India

S Gamoth, L singh Songare - irjweb.com
In this thesis we initiates the analysis of twin specific or particular or especially security
threats (means of declaration of an intention or a determination to inflict harm on another) on …