{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:06:26Z","timestamp":1743131186493,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494966"},{"type":"electronic","value":"9783540494973"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_3","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T06:26:42Z","timestamp":1163572002000},"page":"30-49","source":"Crossref","is-referenced-by-count":3,"title":["A Topological Condition for Solving Fair Exchange in Byzantine Environments"],"prefix":"10.1007","author":[{"given":"Beno\u00eet","family":"Garbinato","sequence":"first","affiliation":[]},{"given":"Ian","family":"Rickebusch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Avoine, G., G\u00e4rtner, F., Guerraoui, R., Kursawe, K., Vaudenay, S., Vukolic, M.: Reducing fair exchange to atomic commit. Technical report, Swiss Federal Institute of Technology (EPFL) (2004)"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/11408901_5","volume-title":"Dependable Computing - EDCC 2005","author":"G. Avoine","year":"2005","unstructured":"Avoine, G., G\u00e4rtner, F., Guerraoui, R., Vukolic, M.: Gracefully degrading fair exchange with security modules (extended abstract). In: Dal Cin, M., Ka\u00e2niche, M., Pataricza, A. (eds.) EDCC 2005. LNCS, vol.\u00a03463, pp. 55\u201371. Springer, Heidelberg (2005)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Avoine, G., Vaudenay, S.: Fair exchange with guardian angels. Technical report, Swiss Federal Institute of Technology (EPFL) (2003)","DOI":"10.1007\/978-3-540-24591-9_15"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of the 6th International Workshop on Innovative Internet Community Systems (I2CS 2006)","author":"B. Garbinato","year":"2006","unstructured":"Garbinato, B., Rickebusch, I.: Impossibility results on fair exchange. In: Proceedings of the 6th International Workshop on Innovative Internet Community Systems (I2CS 2006). LNCS. Springer, Heidelberg (2006)"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/49.839935","volume":"18","author":"N. Asokan","year":"2000","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. IEEE Journal on Selected Area in Communications\u00a018, 593\u2013610 (2000)","journal-title":"IEEE Journal on Selected Area in Communications"},{"issue":"10","key":"3_CR6","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/2.955100","volume":"34","author":"J. Dyer","year":"2001","unstructured":"Dyer, J., Lindemann, M., Perez, R., Sailer, R., van Doorn, L., Smith, S., Weingart, S.: Building the IBM 4758 secure coprocessor. Computer\u00a034(10), 57\u201366 (2001)","journal-title":"Computer"},{"key":"3_CR7","unstructured":"Bajikar, S.: Trusted Platform Module (TPM) based Security on Notebook PCs \u2013 White Paper. Intel Corporation \u2013 Mobile Platforms Group. (2002)"},{"key":"3_CR8","first-page":"27","volume-title":"Dependable Computing Systems: Paradigms, Performance Issues, and Applications","author":"A. Doudou","year":"2005","unstructured":"Doudou, A., Garbinato, B., Guerraoui, R.: Tolerating Arbitrary Failures with State Machine Replication. In: Dependable Computing Systems: Paradigms, Performance Issues, and Applications, pp. 27\u201356. Wiley, Chichester (2005)"},{"issue":"2","key":"3_CR9","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1145\/226643.226647","volume":"43","author":"T.D. Chandra","year":"1996","unstructured":"Chandra, T.D., Toueg, S.: Unreliable failure detectors for reliable distributed systems. Journal of the ACM\u00a043(2), 225\u2013267 (1996)","journal-title":"Journal of the ACM"},{"key":"3_CR10","unstructured":"Hadzilacos, V., Toueg, S.: Fault-tolerant broadcasts and related problems, pp. 97\u2013145 (1993)"},{"key":"3_CR11","unstructured":"Pagnia, H., G\u00e4rtner, F.: On the impossibility of fair exchange without a trusted third party. Technical report, Swiss Federal Institute of Technology (EPFL) (1999)"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1109\/DSN.2005.42","volume-title":"DSN 2005: Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005)","author":"V. Drabkin","year":"2005","unstructured":"Drabkin, V., Friedman, R., Segal, M.: Efficient byzantine broadcast in wireless ad-hoc networks. In: DSN 2005: Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), Washington, DC, USA, pp. 160\u2013169. IEEE Computer Society, Los Alamitos (2005)"},{"issue":"3","key":"3_CR13","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Transactions on Programming Languages and Systems\u00a04(3), 382\u2013401 (1982)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"2","key":"3_CR14","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M. Pease","year":"1980","unstructured":"Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. Journal of the ACM\u00a027(2), 228\u2013234 (1980)","journal-title":"Journal of the ACM"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/3-540-36552-4_31","volume-title":"Information Security and Cryptology - ICISC 2002","author":"O. Markowitch","year":"2003","unstructured":"Markowitch, O., Gollmann, D., Kremer, S.: On fairness in exchange protocols. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 451\u2013464. Springer, Heidelberg (2003)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Ray, I., Ray, I.: Fair exchange in e-commerce. SIGecom Exchanges\u00a03(2) (2002)","DOI":"10.1145\/844340.844345"},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1145\/319709.319728","volume-title":"CCS 1999: Proceedings of the 6th ACM conference on Computer and communications security","author":"G. Ateniese","year":"1999","unstructured":"Ateniese, G.: Efficient verifiable encryption (and fair exchange) of digital signatures. In: CCS 1999: Proceedings of the 6th ACM conference on Computer and communications security, pp. 138\u2013146. ACM Press, New York (1999)"},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/266420.266424","volume-title":"CCS 1997: Proceedings of the 4th ACM conference on Computer and communications security","author":"M. Franklin","year":"1997","unstructured":"Franklin, M., Reiter, M.: Fair exchange with a semi-trusted third party (extended abstract). In: CCS 1997: Proceedings of the 4th ACM conference on Computer and communications security, pp. 1\u20135. ACM Press, New York (1997)"},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/872035.872038","volume-title":"PODC 2003: Proceedings of the twenty-second annual symposium on Principles of distributed computing","author":"S. Micali","year":"2003","unstructured":"Micali, S.: Simple and fast optimistic protocols for fair electronic exchange. In: PODC 2003: Proceedings of the twenty-second annual symposium on Principles of distributed computing, pp. 12\u201319. ACM Press, New York (2003)"},{"issue":"3","key":"3_CR20","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.dss.2003.10.011","volume":"39","author":"I. Ray","year":"2005","unstructured":"Ray, I., Ray, I., Natarajan, N.: An anonymous and failure resilient fair-exchange e-commerce protocol. Decision Support Systems\u00a039(3), 267\u2013292 (2005)","journal-title":"Decision Support Systems"},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1145\/3149.214121","volume":"32","author":"M. Fischer","year":"1985","unstructured":"Fischer, M., Lynch, N., Paterson, M.: Impossibility of Distributed Consensus with One Faulty Process. J. ACM\u00a032, 374\u2013382 (1985)","journal-title":"J. ACM"},{"key":"3_CR22","unstructured":"Even, S., Yacobi, Y.: Relations among public key signature systems. Technical report, Technion - Israel Institute of Technology (1980)"},{"key":"3_CR23","unstructured":"Ketchpel, S., Garc\u00eda-Molina, H.: Making trust explicit in distributed commerce transactions. In: Proceedings of the International Conference on Distributed Computing Systems (1995)"},{"key":"3_CR24","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/62212.62214","volume-title":"STOC 1988: Proceedings of the 20th ACM symposium on Theory of computing","author":"D. Chaum","year":"1988","unstructured":"Chaum, D., Cr\u00e9peau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: STOC 1988: Proceedings of the 20th ACM symposium on Theory of computing, pp. 11\u201319. ACM Press, New York (1988)"},{"key":"3_CR25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656","volume-title":"The Foundations of Cryptography","author":"O. Goldreich","year":"2004","unstructured":"Goldreich, O.: The Foundations of Cryptography, vol.\u00a02. Cambridge University Press, Cambridge (2004)"},{"issue":"9","key":"3_CR26","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/0167-4048(90)90114-9","volume":"9","author":"H. B\u00fcrk","year":"1990","unstructured":"B\u00fcrk, H., Pfitzmann, A.: Value exchange systems enabling security and unobservability. Computers & Security\u00a09(9), 715\u2013721 (1990)","journal-title":"Computers & Security"},{"key":"3_CR27","unstructured":"Bao, F., Deng, R.H., Mao, W.: Efficient and practical fair exchange protocols with off-line TTP. In: RSP: 19th IEEE Computer Society Symposium on Research in Security and Privacy (1998)"},{"key":"3_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1007\/3-540-45022-X_44","volume-title":"Automata, Languages and Programming","author":"B. Baum-Waidner","year":"2000","unstructured":"Baum-Waidner, B., Waidner, M.: Round-optimal and abuse free optimistic multi-party contract signing. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol.\u00a01853, pp. 524\u2013535. Springer, Heidelberg (2000)"},{"key":"3_CR29","volume-title":"19th International Parallel and Distributed Processing Symposium (IPDPS 2005)","author":"M. Srivatsa","year":"2005","unstructured":"Srivatsa, M., Xiong, L., Liu, L.: Exchangeguard: A distributed protocol for electronic fair-exchange. In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005). IEEE Computer Society, Los Alamitos (2005)"},{"key":"3_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-38424-3_6","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"S. Goldwasser","year":"1991","unstructured":"Goldwasser, S., Levin, L.: Fair computation of general functions in presence of immoral majority. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 77\u201393. Springer, Heidelberg (1991)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:07:20Z","timestamp":1566763640000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/11935308_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}