{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T01:56:39Z","timestamp":1777427799262,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540208273","type":"print"},{"value":"9783540245919","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_15","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T03:36:56Z","timestamp":1280374616000},"page":"188-202","source":"Crossref","is-referenced-by-count":11,"title":["Fair Exchange with Guardian Angels"],"prefix":"10.1007","author":[{"given":"Gildas","family":"Avoine","sequence":"first","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Asokan, N., Schunter, M., Waidner, M.: Optimistic protocols for fair exchange. Research Report RZ 2858, IBM Research Division, Zurich, Switzerland (September 1996)","DOI":"10.1145\/266420.266426"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Asokan, N., Schunter, M., Waidner, M.: Optimistic protocols for multi-party fair exchange. Research Report RZ 2892, IBM Research Division, Zurich, Switzerland (December 1996)","DOI":"10.1145\/266420.266426"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/266420.266426","volume-title":"Proceedings of 4th ACM Conference on Computer and Communications Security","author":"N. Asokan","year":"1997","unstructured":"Asokan, N., Schunter, M., Waidner, M.: Optimistic protocols for fair exchange. In: Proceedings of 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, April 1997, pp. 7\u201317. ACM Press, New York (1997)"},{"key":"15_CR4","first-page":"86","volume-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy","author":"N. Asokan","year":"1998","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Asynchronous protocols for optimistic fair exchange. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, USA, May 1998, pp. 86\u201399. IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/BFb0054156","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"N. Asokan","year":"1998","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 591\u2013606. Springer, Heidelberg (1998)"},{"issue":"1","key":"15_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/18.50372","volume":"36","author":"M. Ben-Or","year":"1990","unstructured":"Ben-Or, M., Goldreich, O., Micali, S., Rivest, R.L.: A fair protocol for signing contracts. IEEE Transactions on Information Theory\u00a036(1), 40\u201346 (1990)","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR7","unstructured":"Berclaz, J., Vaquin, S.: Fair exchange between iPAQs. Semester project, Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland (February 2002), http:\/\/lasecwww.epfl.ch"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/3-540-48184-2_11","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"E.F. Brickell","year":"1988","unstructured":"Brickell, E.F., Chaum, D., Damg\u00e5rd, I.B., van de Graaf, J.: Gradual and verifiable release of a secret. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 156\u2013166. Springer, Heidelberg (1988)"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"D. Chaum","year":"1993","unstructured":"Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 89\u2013105. Springer, Heidelberg (1993)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1007\/0-387-34805-0_50","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R. Cleve","year":"1990","unstructured":"Cleve, R.: Controlled gradual disclosure schemes for random bits and their applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 573\u2013588. Springer, Heidelberg (1990)"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/3-540-48285-7_17","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"I.B. Damg\u00e5rd","year":"1994","unstructured":"Damg\u00e5rd, I.B.: Practical and probably secure release of a secret and exchange of signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 200\u2013217. Springer, Heidelberg (1994)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: The TLS protocol \u2013 version 1.0 (January 1999)","DOI":"10.17487\/rfc2246"},{"key":"15_CR13","unstructured":"Even, S., Yacobi, Y.: Relations amoung public key signature systems. Technical Report 175, Computer Science Department, Technicon, Israel (1980)"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/266420.266424","volume-title":"Proceedings of the 4th ACM Conference on Computer and Communications Security","author":"M. Franklin","year":"1997","unstructured":"Franklin, M., Reiter, M.K.: Fair exchange with a semi-trusted third party. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, April 1997, pp. 1\u20135. ACM Press, New York (1997)"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/BFb0055475","volume-title":"Financial Cryptography","author":"M. Franklin","year":"1998","unstructured":"Franklin, M., Tsudik, G.: Secure group barter: Multi-party fair exchange with semi-trusted neutral parties. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol.\u00a01465, pp. 90\u2013102. Springer, Heidelberg (1998)"},{"key":"15_CR16","first-page":"354","volume-title":"Proceedings of the International Workshop on Electronic Commerce \u2013 WELCOM 1999","author":"F.C. G\u00e4rtner","year":"1999","unstructured":"G\u00e4rtner, F.C., Pagnia, H., Vogt, H.: Approaching a formal definition of fairness in electronic commerce. In: Proceedings of the International Workshop on Electronic Commerce \u2013 WELCOM 1999, Lausanne, Switzerland, October 1999, pp. 354\u2013359. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/BFb0022140","volume-title":"Distributed Algorithms","author":"R. Guerraoui","year":"1995","unstructured":"Guerraoui, R.: Revisiting the relationship between non-blocking atomic commitment and consensus. In: H\u00e9lary, J.-M., Raynal, M. (eds.) WDAG 1995. LNCS, vol.\u00a0972, pp. 87\u2013100. Springer, Heidelberg (1995)"},{"issue":"1","key":"15_CR18","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s446-002-8027-4","volume":"15","author":"R. Guerraoui","year":"2002","unstructured":"Guerraoui, R.: Non-blocking atomic commit in asynchronous distributed systems with failure detectors. Distributed Computing\u00a015(1), 17\u201325 (2002)","journal-title":"Distributed Computing"},{"key":"15_CR19","unstructured":"Hubaux, J.-P., Le Boudec, J.-Y., Giordano, S., Hamdi, M.: The terminode project: Toward mobile ad-hoc wans. In: Proceedings of the Sixth IEEE International Workshop on Mobile, Multimedia Communications \u2013 Mo-MuC 1999, San-Diego, California, USA (1999)"},{"issue":"1","key":"15_CR20","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/35.894385","volume":"39","author":"J.-P. Hubaux","year":"2001","unstructured":"Hubaux, J.-P., Gross, T., Le Boudec, J.-Y., Vetterli, M.: Towards self-organizing mobile ad-hoc networks: the terminodes project. IEEE Comm. Mag.\u00a039(1), 118\u2013124 (2001)","journal-title":"IEEE Comm. Mag."},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1007\/3-540-49264-X_18","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"M. Jakobsson","year":"1995","unstructured":"Jakobsson, M.: Ripping coins for a fair exchange. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 220\u2013230. Springer, Heidelberg (1995)"},{"key":"15_CR22","unstructured":"Kremer, S., Markowitch, O., Zhou, J.: An intensive survey of nonrepudiation protocols. Technical Report ULB\u2013474, Universit\u00e9 Libre de Bruxelles, Bruxelles, Belgium (2001)"},{"key":"15_CR23","unstructured":"Markowitch, O.: Les protocoles de non-r\u00e9pudiation. PhD thesis, University of Bruxelles, Bruxelles, Belgium (January 2001)"},{"key":"15_CR24","series-title":"Lecture Notes in Computer Science","first-page":"329","volume-title":"Financial Cryptography","author":"O. Markowitch","year":"2002","unstructured":"Markowitch, O., Saeednia, S.: Optimistic fair exchange with transparent signature recovery. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, p. 329. Springer, Heidelberg (2002)"},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1145\/191177.191221","volume-title":"Proceedings of the 2nd ACM Conference on Computer and Communications Security","author":"T. Okamoto","year":"1994","unstructured":"Okamoto, T., Ohta, K.: How to simultaneously exchange secrets by general assumptions. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 1994, pp. 184\u2013192. ACM Press, New York (1994)"},{"issue":"1","key":"15_CR26","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1093\/comjnl\/46.1.55","volume":"46","author":"H. Pagnia","year":"2003","unstructured":"Pagnia, H., Vogt, H., G\u00e4rtner, F.C.: Fair exchange. The computer Journal\u00a046(1), 55\u201375 (2003)","journal-title":"The computer Journal"},{"issue":"2","key":"15_CR27","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/0022-0000(83)90042-9","volume":"27","author":"M.O. Rabin","year":"1883","unstructured":"Rabin, M.O.: Transaction protection by beacons. Journal of Computer and System Science\u00a027(2), 256\u2013267 (1883)","journal-title":"Journal of Computer and System Science"},{"key":"15_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/3-540-44463-7_8","volume-title":"Electronic Commerce and Web Technologies","author":"I. Ray","year":"2000","unstructured":"Ray, I., Ray, I.: An optimistic fair exchange e-commerce protocol with automated dispute resolution. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol.\u00a01875, pp. 84\u201393. Springer, Heidelberg (2000)"},{"key":"15_CR29","unstructured":"Schunter, M.: Optimistic Fair Exchange. PhD thesis, University of Saarlandes, Saarbruken, Germany (October 2000)"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Syverson, P.: Weakly secret bit commitment: Applications to lotteries and fair exchange. In: Proceedings of the 11th Computer Security Foundations Workshop \u2013 PCSFW, IEEE, Rockport, Massachusetts, USA, June 1998, pp. 2\u201313. IEEE Computer Society Press, Los Alamitos (1998)","DOI":"10.21236\/ADA464109"},{"key":"15_CR31","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-1-4684-4730-9_13","volume-title":"Advances in Cryptology","author":"Tom Tedrick","year":"1984","unstructured":"Tedrick, T.: How to exchange half a bit. In: Chaum, D. (ed.) Advances in Cryptology \u2013 CRYPTO 1983, pp. 147\u2013151. Plenum Press, New York (1983)"},{"key":"15_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1007\/3-540-39568-7_34","volume-title":"Advances in Cryptology","author":"T. Tedrick","year":"1985","unstructured":"Tedrick, T.: Fair exchange of secrets. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 434\u2013438. Springer, Heidelberg (1985)"},{"key":"15_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-540-45126-6_15","volume-title":"Financial Cryptography","author":"H. Vogt","year":"2003","unstructured":"Vogt, H.: Asynchronous optimistic fair exchange based on revocable items. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 208\u2013222. Springer, Heidelberg (2003)"},{"issue":"2","key":"15_CR34","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1023\/A:1022276913209","volume":"8","author":"H. Vogt","year":"2003","unstructured":"Vogt, H., G\u00e4rtner, F.C., Pagnia, H.: Supporting fair exchange in mobile environments. Journal on Mobile Networks and Applications\u00a08(2), 127\u2013136 (2003)","journal-title":"Journal on Mobile Networks and Applications"},{"key":"15_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/3-540-45598-1_11","volume-title":"Electronic Commerce","author":"H. Vogt","year":"2001","unstructured":"Vogt, H., Pagnia, H., G\u00e4rtner, F.C.: Using smart cards for fair exchange. In: Fiege, L., M\u00fchl, G., Wilhelm, U. (eds.) WELCOM 2001. LNCS, vol.\u00a02232, pp. 101\u2013113. Springer, Heidelberg (2001)"},{"key":"15_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/3-540-48970-3_21","volume-title":"Information Security and Privacy","author":"J. Zhou","year":"1999","unstructured":"Zhou, J., Deng, R., Bao, F.: Evolution of fair non repudiation with TTP. In: Pieprzyk, J., Safavi-Naini, R., Seberry, J. (eds.) ACISP 1999. LNCS, vol.\u00a01587, pp. 258\u2013269. Springer, Heidelberg (1999)"},{"key":"15_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-540-46588-1_4","volume-title":"Public Key Cryptography","author":"J. Zhou","year":"2000","unstructured":"Zhou, J., Deng, R., Bao, F.: Some remarks on a fair exchange protocol. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol.\u00a01751, pp. 46\u201357. Springer, Heidelberg (2000)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T02:44:47Z","timestamp":1635821087000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}