Abstract
This paper presents an e-contract securing system, using the digital signature approach, for various e-commerce applications. The proposed system is composed of three phases, namely, e-contract hashing and digital signing phases that are applied at sender’s side, with addition to digital signature verification phase that is applied at the corresponding receiver’s side. The implementation of the proposed system shows accurate and effective results in terms of signing and verification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Schwiderski-Grosche, S., Knospe, H.: Secure Mobile Commerce. Special issue of the IEE Electronics and Communication Engineering Journal on Security for Mobility 14(5), 228–238 (2002)
Marchany, R.C., Tront, J.G.: E-Commerce Security Issues. In: The 35th Hawaii International Conference on System Sciences, pp. 2500–2508 (2002)
Angelov, S., Till, S., Grefen, P.: Dynamic and Secure B2B E-contract Update Management. In: EC 2005 Conference, Vancouver, British Columbia, Canada (2005)
Haouzia, A., Noumeir, R.: Methods for Image Authentication: A Survey. Multimedia Tools and Applications 39(1), 1–46 (2008)
Pfitzmann, B.: Digital Signature Schemes: General Framework and Fail-Stop Signatures. LNCS, vol. 1100. Springer, Berlin (1996)
Menzel, T., Schweighofer, E.: Securing Electronic Commerce with Digital Signatures - Do Digital Signatures Comply with the Legal Criteria for the Written Form and Supply Equal Proof? In: The 14th BILETA Conference (CYBERSPACE 1999) Crime, Criminal Justice and the Internet, College of Ripon & York St. John, York, England (1999), http://www.bileta.ac.uk/99papers/menzel.html
Fantinato, M.: A Feature-based Approach to Web Services E-contract Establishment. IBM Research Report. In: Di Nitto, E., Ripeanu, M. (eds.) ICSOC 2007. LNCS, vol. 4907, Springer, Heidelberg (2009)
Wright, B.: The Law of Electronic Commerce - EDI, E-Mail, and Internet: Technology, Proof, and Liability. Little Brown and Company, Boston (1996)
Matsuo, T., Kaoru, K.: On Parallel Hash Functions Based on Block-ciphers. The IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 67–74 (2004)
Skala, V., Kucha, M.: The Hash Function and The Principle of Duality. The Computer Graphics International 200, 167–174 (2001)
El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)
Paar, C., Pelzl, J., Preneel, B.: Understanding Cryptography: A Textbook for Students and Practitioners, 2nd edn. Digital Signatures, ch.10. Springer, Heidelberg (2010)
Chen, H., Shen, X., Lv, Y.: A New Digital Signature Algorithm Similar to ELGamal Type. Journal of Software - JSW 5(3), 320–327 (2010)
Li, X., Sun, F., Wu, E.: Modulo Multiplicative Inverse Circuit Design. University of Macau, Macao (2006)
Wang, Y., Wong, K.-W., Xiao, D.: Parallel Hash Function Construction Based on Coupled Map Lattices. Communications in Nonlinear Science and Numerical Simulation 16(7), 2810–2821 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
El-Bendary, N. et al. (2011). E-Contract Securing System Using Digital Signature Approach. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Advanced Communication and Networking. ACN 2011. Communications in Computer and Information Science, vol 199. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23312-8_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-23312-8_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23311-1
Online ISBN: 978-3-642-23312-8
eBook Packages: Computer ScienceComputer Science (R0)