Cryptology ePrint Archive: Report 2009/427

Efficient Verifiable Escrow and Fair Exchange with Trusted Hardware

Stephen R. Tate and Roopa Vishwanathan

Abstract: At the heart of many fair exchange problems is verifiable escrow: a sender encrypts some value using the public key of a trusted party (called the recovery agent), and then must convince the receiver of the ciphertext that the corresponding plaintext satisfies some property (e.g., it contains the sender's signature on a contract). Previous solutions to this problem are interactive, and often rely on communication-intensive cut-and-choose zero-knowledge proofs. In this paper, we provide a solution that uses generic trusted hardware to create an efficient, non-interactive verifiable escrow scheme. Our solution allows the protocol to use a set of recovery agents with a threshold access structure, the \emph{verifiable group escrow} notion which was informally introduced by Camenisch and Damgard and which is formalized here. Finally, this paper shows how this new non-interactive verifiable escrow scheme can be used to create an efficient optimistic protocol for fair exchange of signatures.

Category / Keywords: cryptographic protocols/ fair exchange, verifiable encryption, verifiable escrow

Publication Info: An abbreviated, preliminary version of this work appeared in the \emph{Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'09)

Date: received 1 Sep 2009, last revised 29 May 2013

Contact author: vishwanathan roopa at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20130529:175044 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]