Download - Fair Exchange Protocol New
![Page 1: Fair Exchange Protocol New](https://reader030.vdocuments.site/reader030/viewer/2022012901/577d23c01a28ab4e1e9aad49/html5/thumbnails/1.jpg)
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 1/15
“Implementation of Fair Exchange
Protocol”
![Page 2: Fair Exchange Protocol New](https://reader030.vdocuments.site/reader030/viewer/2022012901/577d23c01a28ab4e1e9aad49/html5/thumbnails/2.jpg)
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 2/15
In an e-commerce environment, the merchant and thecustomer are unlikely to trust each other. This problem hasmotivated researchers to propose fair-exchange protocolsbased on using an on-line trusted third party.
We have implemented a fair exchange protocol whichensures:
i. Fair exchange.
ii. Not requiring manual dispute resolution in case of unfair behavior by any party
![Page 3: Fair Exchange Protocol New](https://reader030.vdocuments.site/reader030/viewer/2022012901/577d23c01a28ab4e1e9aad49/html5/thumbnails/3.jpg)
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 3/15
The customer The merchant &
The Trusted Third Party (Administrator)
CustomerMerchant
Administrator
![Page 4: Fair Exchange Protocol New](https://reader030.vdocuments.site/reader030/viewer/2022012901/577d23c01a28ab4e1e9aad49/html5/thumbnails/4.jpg)
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 4/15
Every party involved in the transaction has togenerate their keys-
Public Key
Private Key
Keys will be generated using the tools thatcan be downloaded from the web-site.
![Page 5: Fair Exchange Protocol New](https://reader030.vdocuments.site/reader030/viewer/2022012901/577d23c01a28ab4e1e9aad49/html5/thumbnails/5.jpg)
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 5/15
The Merchant encrypts his product with theAdvanced Encryption Standard(AES)Encryption tool provided by the site.
The merchant hides the encrypted product inan image.
Then he uploads the image to the site andalso provides the encrypted product key to
the admin.Admin keeps this product key to give it to the
customer in case of any dispute.
![Page 6: Fair Exchange Protocol New](https://reader030.vdocuments.site/reader030/viewer/2022012901/577d23c01a28ab4e1e9aad49/html5/thumbnails/6.jpg)
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 6/15
The administrator then verifies the product.After verification of the product the admin
makes the product available for downloading.
Website
Merchant
Uploadsproduct
Administrator
Verifiesproduct
Makes availablefor downloading
![Page 7: Fair Exchange Protocol New](https://reader030.vdocuments.site/reader030/viewer/2022012901/577d23c01a28ab4e1e9aad49/html5/thumbnails/7.jpg)
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 7/15
The fair exchange protocol begins when thecustomer downloads the product. Afterdownloading he gets a Transaction Number.
A series of messages are exchanged between the
customer and the merchant.
Customer
WebsiteDownloadsproduct
![Page 8: Fair Exchange Protocol New](https://reader030.vdocuments.site/reader030/viewer/2022012901/577d23c01a28ab4e1e9aad49/html5/thumbnails/8.jpg)
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 8/15
Customer (C) initiates the e-commerce transaction by
sending Merchant(M) three things:
a purchase order, PO
the public key of C Transaction number
Customer Merchant
{Purchase orderPublic Key &Transaction No.}
![Page 9: Fair Exchange Protocol New](https://reader030.vdocuments.site/reader030/viewer/2022012901/577d23c01a28ab4e1e9aad49/html5/thumbnails/9.jpg)
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 9/15
M after receiving Message 1 checks if the purchase order is tohis satisfaction. If M is not satisfied, he sends an abortmessage to C and aborts the transaction.
If M is happy with the purchase order and wants to continuewith the protocol he sends the following things to C :
Encrypted account information & Merchant’s public key.
Merchant Customer
If not satisfied, M sends abort msg
Else M sends, Encrypted a/c info& his public key
![Page 10: Fair Exchange Protocol New](https://reader030.vdocuments.site/reader030/viewer/2022012901/577d23c01a28ab4e1e9aad49/html5/thumbnails/10.jpg)
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 10/15
After receiving Message 2 from M , C checks to see if it is anabort message or the encrypted account information.
If it is an abort, C aborts the transaction.
If C has received the encrypted account information then heprepares a payment token for the specified account number
and send it to merchant.
Customer Merchant
If it is an abort, C aborts thetransaction.
Prepares & sends payment token forspecified a/c no.
![Page 11: Fair Exchange Protocol New](https://reader030.vdocuments.site/reader030/viewer/2022012901/577d23c01a28ab4e1e9aad49/html5/thumbnails/11.jpg)
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 11/15
If merchant’s account is successfully credited
he sends the product key else he sends anabort message.
Merchant Customer
Sends product key
Else sends abort message
![Page 12: Fair Exchange Protocol New](https://reader030.vdocuments.site/reader030/viewer/2022012901/577d23c01a28ab4e1e9aad49/html5/thumbnails/12.jpg)
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 12/15
The customer cannot cheat as he wont begetting the product key until the merchant’saccount gets credited successfully.
The only possible fraud is from themerchant’s side & that is, he gets thepayment from the customer and he refuses tosend him the product key.
![Page 13: Fair Exchange Protocol New](https://reader030.vdocuments.site/reader030/viewer/2022012901/577d23c01a28ab4e1e9aad49/html5/thumbnails/13.jpg)
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 13/15
Now the trusted third party comes intopicture.
The administrator acts as the TTP.
He then sees the messages that were sentduring the transaction and checks whetherthe customer is been cheated, if so then theadmin sends the product key to the
customer.
![Page 14: Fair Exchange Protocol New](https://reader030.vdocuments.site/reader030/viewer/2022012901/577d23c01a28ab4e1e9aad49/html5/thumbnails/14.jpg)
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 14/15
The various possible enhancements of our
project are-
The number of messages exchanged pertransaction can be reduced.
Automation of certain tasks is possible.
This protocol can be used in the ecommerceextensively to provide fair transaction.
![Page 15: Fair Exchange Protocol New](https://reader030.vdocuments.site/reader030/viewer/2022012901/577d23c01a28ab4e1e9aad49/html5/thumbnails/15.jpg)
8/3/2019 Fair Exchange Protocol New
http://slidepdf.com/reader/full/fair-exchange-protocol-new 15/15