Upload
vineet-sansare
View
230
Download
0
Embed Size (px)
Citation preview
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 1/15
“Implementation of Fair Exchange
Protocol”
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 2/15
In an e-commerce environment, the merchant and thecustomer are unlikely to trust each other. This problem hasmotivated researchers to propose fair-exchange protocolsbased on using an on-line trusted third party.
We have implemented a fair exchange protocol whichensures:
i. Fair exchange.
ii. Not requiring manual dispute resolution in case of unfair behavior by any party
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 3/15
The customer The merchant &
The Trusted Third Party (Administrator)
CustomerMerchant
Administrator
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 4/15
Every party involved in the transaction has togenerate their keys-
Public Key
Private Key
Keys will be generated using the tools thatcan be downloaded from the web-site.
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 5/15
The Merchant encrypts his product with theAdvanced Encryption Standard(AES)Encryption tool provided by the site.
The merchant hides the encrypted product inan image.
Then he uploads the image to the site andalso provides the encrypted product key to
the admin.Admin keeps this product key to give it to the
customer in case of any dispute.
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 6/15
The administrator then verifies the product.After verification of the product the admin
makes the product available for downloading.
Website
Merchant
Uploadsproduct
Administrator
Verifiesproduct
Makes availablefor downloading
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 7/15
The fair exchange protocol begins when thecustomer downloads the product. Afterdownloading he gets a Transaction Number.
A series of messages are exchanged between the
customer and the merchant.
Customer
WebsiteDownloadsproduct
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 8/15
Customer (C) initiates the e-commerce transaction by
sending Merchant(M) three things:
a purchase order, PO
the public key of C Transaction number
Customer Merchant
{Purchase orderPublic Key &Transaction No.}
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 9/15
M after receiving Message 1 checks if the purchase order is tohis satisfaction. If M is not satisfied, he sends an abortmessage to C and aborts the transaction.
If M is happy with the purchase order and wants to continuewith the protocol he sends the following things to C :
Encrypted account information & Merchant’s public key.
Merchant Customer
If not satisfied, M sends abort msg
Else M sends, Encrypted a/c info& his public key
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 10/15
After receiving Message 2 from M , C checks to see if it is anabort message or the encrypted account information.
If it is an abort, C aborts the transaction.
If C has received the encrypted account information then heprepares a payment token for the specified account number
and send it to merchant.
Customer Merchant
If it is an abort, C aborts thetransaction.
Prepares & sends payment token forspecified a/c no.
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 11/15
If merchant’s account is successfully credited
he sends the product key else he sends anabort message.
Merchant Customer
Sends product key
Else sends abort message
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 12/15
The customer cannot cheat as he wont begetting the product key until the merchant’saccount gets credited successfully.
The only possible fraud is from themerchant’s side & that is, he gets thepayment from the customer and he refuses tosend him the product key.
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 13/15
Now the trusted third party comes intopicture.
The administrator acts as the TTP.
He then sees the messages that were sentduring the transaction and checks whetherthe customer is been cheated, if so then theadmin sends the product key to the
customer.
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 14/15
The various possible enhancements of our
project are-
The number of messages exchanged pertransaction can be reduced.
Automation of certain tasks is possible.
This protocol can be used in the ecommerceextensively to provide fair transaction.
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 15/15