Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

E-Contract Securing System Using Digital Signature Approach

  • Conference paper
Advanced Communication and Networking (ACN 2011)

Abstract

This paper presents an e-contract securing system, using the digital signature approach, for various e-commerce applications. The proposed system is composed of three phases, namely, e-contract hashing and digital signing phases that are applied at sender’s side, with addition to digital signature verification phase that is applied at the corresponding receiver’s side. The implementation of the proposed system shows accurate and effective results in terms of signing and verification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Schwiderski-Grosche, S., Knospe, H.: Secure Mobile Commerce. Special issue of the IEE Electronics and Communication Engineering Journal on Security for Mobility 14(5), 228–238 (2002)

    Article  Google Scholar 

  2. Marchany, R.C., Tront, J.G.: E-Commerce Security Issues. In: The 35th Hawaii International Conference on System Sciences, pp. 2500–2508 (2002)

    Google Scholar 

  3. Angelov, S., Till, S., Grefen, P.: Dynamic and Secure B2B E-contract Update Management. In: EC 2005 Conference, Vancouver, British Columbia, Canada (2005)

    Google Scholar 

  4. Haouzia, A., Noumeir, R.: Methods for Image Authentication: A Survey. Multimedia Tools and Applications 39(1), 1–46 (2008)

    Article  Google Scholar 

  5. Pfitzmann, B.: Digital Signature Schemes: General Framework and Fail-Stop Signatures. LNCS, vol. 1100. Springer, Berlin (1996)

    MATH  Google Scholar 

  6. Menzel, T., Schweighofer, E.: Securing Electronic Commerce with Digital Signatures - Do Digital Signatures Comply with the Legal Criteria for the Written Form and Supply Equal Proof? In: The 14th BILETA Conference (CYBERSPACE 1999) Crime, Criminal Justice and the Internet, College of Ripon & York St. John, York, England (1999), http://www.bileta.ac.uk/99papers/menzel.html

  7. Fantinato, M.: A Feature-based Approach to Web Services E-contract Establishment. IBM Research Report. In: Di Nitto, E., Ripeanu, M. (eds.) ICSOC 2007. LNCS, vol. 4907, Springer, Heidelberg (2009)

    Google Scholar 

  8. Wright, B.: The Law of Electronic Commerce - EDI, E-Mail, and Internet: Technology, Proof, and Liability. Little Brown and Company, Boston (1996)

    Google Scholar 

  9. Matsuo, T., Kaoru, K.: On Parallel Hash Functions Based on Block-ciphers. The IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 67–74 (2004)

    Google Scholar 

  10. Skala, V., Kucha, M.: The Hash Function and The Principle of Duality. The Computer Graphics International 200, 167–174 (2001)

    Google Scholar 

  11. El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  12. Paar, C., Pelzl, J., Preneel, B.: Understanding Cryptography: A Textbook for Students and Practitioners, 2nd edn. Digital Signatures, ch.10. Springer, Heidelberg (2010)

    Book  MATH  Google Scholar 

  13. Chen, H., Shen, X., Lv, Y.: A New Digital Signature Algorithm Similar to ELGamal Type. Journal of Software - JSW 5(3), 320–327 (2010)

    Google Scholar 

  14. Li, X., Sun, F., Wu, E.: Modulo Multiplicative Inverse Circuit Design. University of Macau, Macao (2006)

    Google Scholar 

  15. Wang, Y., Wong, K.-W., Xiao, D.: Parallel Hash Function Construction Based on Coupled Map Lattices. Communications in Nonlinear Science and Numerical Simulation 16(7), 2810–2821 (2011)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

El-Bendary, N. et al. (2011). E-Contract Securing System Using Digital Signature Approach. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Advanced Communication and Networking. ACN 2011. Communications in Computer and Information Science, vol 199. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23312-8_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23312-8_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23311-1

  • Online ISBN: 978-3-642-23312-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics