Implementation and Analysis of a Synchronisation Protocol for Fair Exchange with Strong Fairness and Privacy

Authors

  • Dhileane de Andrade Rodrigues Unijuí University – UNIJUI
  • Mailson Teles Borges Unijuí University – UNIJUI
  • Fabricia Roos-Frantz Unijuí University – UNIJUI
  • Rafael Z.Frantz Unijuí University – UNIJUI
  • Sandro Sawicki Unijuí University – UNIJUI

DOI:

https://doi.org/10.5753/isys.2026.6859

Keywords:

Fair Exchange, Fair Exchange Protocols, Distributed Information Systems, Protocol Validation, Model-checking, Trusted Hardware

Abstract

In distributed information systems, it is essential to ensure fairness and privacy in the exchange of digital items between parties that do not fully trust each other. In such environments, multiple entities (users, organizations, services, devices, etc.) interact by exchanging data, documents, or digital assets. In the absence of trust between the parties involved, the risk of unfairness arises, namely the possibility that one party gains unfair advantage over the other. Fair exchange protocols have been developed to ensure that no participant obtains this advantage, thereby guaranteeing that exchanges occur fairly. Privacy, another fundamental property, prevents the leakage of confidential information. However, achieving both strong fairness and privacy simultaneously remains a challenge. Protocols widely used in information systems for online payments, e-commerce, and digital signatures ensure fairness but compromise privacy because they rely on mediating centralised third parties that directly access participants’ data, including sensitive information. In this paper, we propose the implementation and analysis of a protocol that ensures strong fairness in distributed information systems, which ensures that none of the participants is left with both items and grants each party the ability to cancel the exchange. The model uses a split trusted third party, composed of two trusted execution environments (one for each participant) and a public bulletin board used solely for synchronisation. This architecture obviates the need of centralised intermediaries and preserves essential properties such as strong fairness, immediate and unilateral cancelation, and privacy. This work is an extended version of the paper presented at SBSeg 2025; it includes new experimental results, formal verification with the SPIN model-checker, and implementation improvements; therefore it contributes to the advancement of interoperable solutions that protect data privacy in distributed information systems.

Downloads

Download data is not yet available.

References

Asokan, N., Schunter, M., and Waidner, M. (1997). Optimistic protocols for fair exchange. In Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 7–17. https://dl.acm.org/doi/10.1145/266420.266426.

Asokan, N., Shoup, V., and Waidner, M. (2000). Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications, 18(4), 593–610. https://doi.org/10.1109/49.839935.

Avoine, G. and Vaudenay, S. (2004). Fair exchange with guardian angels. In International Workshop on Information Security Applications, pp. 188–202. Springer. https://doi.org/10.1007/978-3-540-24591-9_15.

Brickell, E. F., Chaum, D., Damgård, I. B., and van de Graaf, J. (1988). Gradual and verifiable release of a secret. In Advances in Cryptology, pp. 156–166. https://doi.org/10.1007/3-540-48184-2_11.

Colletti, M. (2017). Digital poetics: An open theory of design-research in architecture. Routledge. https://doi.org/10.4324/9781315257761.

Costan, V. and Devadas, S. (2016). Intel SGX explained. Cryptology ePrint Archive, Paper 2016/086. https://eprint.iacr.org/2016/086.

Dierks, T. and Rescorla, E. (2008). RFC 5246: The Transport Layer Security (TLS) Protocol Version 1.2. https://dl.acm.org/doi/10.17487/RFC5246.

Fischer, M. J., Lynch, N. A., and Paterson, M. S. (1985). Impossibility of distributed consensus with one faulty process. Journal of the ACM (JACM), 32(2), 374–382. https://doi.org/10.1145/3149.214121.

Grisenthwaite, R., Barnes, G., Watson, R. N. M., Moore, S. W., Sewell, P., and Woodruff, J. (2023). The ARM Morello evaluation platform—validating CHERI-based security in a high-performance system. IEEE Micro, 43(3), 50–57. https://doi.org/10.1109/MM.2023.3264676.

Horowitz and Zorat (1983). Divide-and-conquer for parallel processing. IEEE Transactions on Computers, 100(6), 582–585. https://doi.org/10.1109/TC.1983.1676280.

Huang, Q., Wong, D. S., and Susilo, W. (2014). P2OFE: Privacy-preserving optimistic fair exchange of digital signatures. In Topics in Cryptology – CT-RSA 2014, pp. 367–384. Springer. https://doi.org/10.1007/978-3-319-04852-9_19.

Jarke, M., Otto, B., and Ram, S. (2019). Data sovereignty and data space ecosystems. Business & Information Systems Engineering, 61(5), 549–550. https://doi.org/10.1007/s12599-019-00614-2.

Kaplan, D., Powell, J., and Woller, T. (2016). AMD memory encryption. White paper. http://docs.amd.com/v/u/en-US/memory-encryption-white-paper.

Lutsch, A., Franck, C., El-Hindi, M., István, Z., and Binnig, C. (2025). An analysis of AWS Nitro Enclaves for database workloads. Journal of the ACM, pp. 1–8. https://doi.org/10.1145/3736227.3736234.

Markowitch, O., Gollmann, D., and Kremer, S. (2003). On fairness in exchange protocols. In International Conference on Information Security and Cryptology (ICISC), pp. 451–465. https://doi.org/10.1007/3-540-36552-4_31.

Markus, M. L. and Silver, M. S. (2008). A foundation for the study of IT effects: A new look at DeSanctis and Poole’s concepts of structural features and spirit. Journal of the Association for Information Systems, 9(10), Article 5. https://doi.org/10.17705/1jais.00176.

Molina-Jimenez, C., Toliver, D., Nakib, H. D., and Crowcroft, J. (2024). Fair exchange: Theory and practice of digital belongings. World Scientific. https://doi.org/10.1142/9781800615175_0001.

Pagnia, H. and Darmstadt, F. C. G. (1999). On the impossibility of fair exchange without a trusted third party. Technical Report, Darmstadt University of Technology. https://api.semanticscholar.org/CorpusID:11671049.

Pinkas, B. (2003). Fair secure two-party computation. In International Conference on the Theory and Applications of Cryptographic Techniques, pp. 87–105. https://doi.org/10.1007/3-540-39200-9_6.

Pinto, S. and Santos, N. (2019). Demystifying ARM TrustZone: A comprehensive survey. ACM Computing Surveys (CSUR), 51(6), 1–36. https://doi.org/10.1145/3291047.

Quixabeira, D., Teles-Borges, M., Roos-Frantz, F., Frantz, R. Z., Sawicki, S., Molina-Jimenez, C., and Crowcroft, J. (2025). Implementation and analysis of a synchronisation protocol for fair exchange with strong fairness and privacy. In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg), pp. 498–514. SBC. https://doi.org/10.5753/sbseg.2025.11390.

Zhang, L., Kan, H., Qiu, F., and Hao, F. (2024). A publicly verifiable optimistic fair exchange protocol using decentralized CP-ABE. The Computer Journal, 67(3), 1017–1029. https://doi.org/10.1093/comjnl/bxad039.

Published

2026-04-03

How to Cite

de Andrade Rodrigues Quixabeira, D., Teles Borges, M. ., Roos-Frantz, F., Z. Frantz, R. ., & Sawicki, S. . (2026). Implementation and Analysis of a Synchronisation Protocol for Fair Exchange with Strong Fairness and Privacy. ISys - Journal of Information Systems, 19(1), 1:1 – 1:32. https://doi.org/10.5753/isys.2026.6859

Issue

Section

Extended versions of selected articles