Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1046290.1046348acmconferencesArticle/Chapter ViewAbstractPublication PagesinfosecuConference Proceedingsconference-collections
Article

A security scheme of electronic commerce for mobile agents uses undetachable digital signatures

Published: 14 November 2004 Publication History

Abstract

A security scheme to protect mobile agents against malicious hosts in electronic commerce is proposed. This scheme uses undetachable digital signatures technique and public key encryption algorithms based on ellipse curves to achieve following characteristics: first, the identity of a shop and a customer cannot be forged. Second, the requirements of a customer and the bid of a shop cannot be detached. Third, the identity and the bid information of a shop keep private against other shops. Finally, it's able to resist replay attacks. Furthermore, the scheme also has some computational advantages compared to similar schemes that use RSA cryptosystem.

References

[1]
Sander, T., and Tschudin, C. Protecting mobile agents against malicious hosts. Mobile Agents and Security, Lecture Notes in Computer Science, 1419: 44--60, 1998.]]
[2]
Kotzanikolaous, P., Burmester, M., and Chrissikopoulos, V. Secure transactions with mobile agents in hostile environments. ACISP 2000, Lecture Notes in Computer Science, 1841: 289--297, 2000.]]
[3]
Lee B., Kim H., and Kim K. Secure mobile agent using strong non-designated proxy signature. ACISP 2001, Lecture Notes in Computer Science, 2119: 474--486, 2001.]]
[4]
K Shum and V Wei. A strong proxy signature scheme with proxy signer privacy protection. Eleventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises: 55--56, 2002.]]
[5]
Borselius, N., Mitchell, C., and Wilson, A. A pragmatic alternative to undetachable signatures. ACM SIGOPS Operating Systems Review, 36, 2(April 2002):6--11.]]
[6]
Johnson, D., Menezes, A., and Vanstone, S. The Elliptic Curve Digital Signature Algorithm (ECDSA), 1999. http://www.cacr.math.uwaterloo.ca/techreports/1999/corr99-34.ps Z]]
[7]
Wang, X., and Wang J. A proxy signature and proxy blind signature scheme based on elliptic curve. Journal of Qinghai University, 20, 3(2002), 36--39.]]
[8]
Vigna, G. Cryptographic traces for mobile agents. Mobile Agents and Security, Lecture Notes in Computer Science, 1419: 137--153, 1998.]]

Cited By

View all
  • (2018)Intrusion-Resilient Undetachable Digital Signature for Mobile-Agent-Based Collaborative Business Systems2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD))10.1109/CSCWD.2018.8465203(401-406)Online publication date: May-2018
  • (2018)Identity-based undetachable digital signature for mobile agents in electronic commerceSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-018-3159-022:20(6921-6935)Online publication date: 1-Oct-2018
  • (2015)Secure Mobile Agents in eCommerce with Forward-Secure Undetachable Digital SignaturesETRI Journal10.4218/etrij.15.0114.065737:3(573-583)Online publication date: 1-Jun-2015
  • Show More Cited By

Index Terms

  1. A security scheme of electronic commerce for mobile agents uses undetachable digital signatures

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    InfoSecu '04: Proceedings of the 3rd international conference on Information security
    November 2004
    266 pages
    ISBN:1581139551
    DOI:10.1145/1046290
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 November 2004

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. electronic commerce
    2. elliptic curves
    3. mobile agents
    4. undetachable digital signatures

    Qualifiers

    • Article

    Conference

    INFOSECU04
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 02 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)Intrusion-Resilient Undetachable Digital Signature for Mobile-Agent-Based Collaborative Business Systems2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD))10.1109/CSCWD.2018.8465203(401-406)Online publication date: May-2018
    • (2018)Identity-based undetachable digital signature for mobile agents in electronic commerceSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-018-3159-022:20(6921-6935)Online publication date: 1-Oct-2018
    • (2015)Secure Mobile Agents in eCommerce with Forward-Secure Undetachable Digital SignaturesETRI Journal10.4218/etrij.15.0114.065737:3(573-583)Online publication date: 1-Jun-2015
    • (2012)An Agent-Based Secure Transaction Protocol with Fair PrivacyProceedings of the 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks10.1109/CICSyN.2012.48(217-222)Online publication date: 24-Jul-2012

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media