Research on digital signature of P2P e-commerce

被引:10
|
作者
Wang, Dongjuan [1 ]
Lu, Ling [2 ]
机构
[1] China Three Gorges Univ, Coll Comp & Informat Technol, Yichang, Peoples R China
[2] China Three Gorges Univ, Coll Elect Engn & Renewable Energy, Yichang, Peoples R China
关键词
trust risk; P2P e-commerce; digital signature; elliptic encryption;
D O I
10.1109/ICCECT.2012.267
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
P2P e-commerce becomes one of most important e-business models. The paper about e-commerce activities has focused on the trust risk increasingly. To solve identity trust problem in e-commerce transactions, the idea of threshold cryptography is introduced and a distributed digital signature scheme based on the P2P e-commerce is designed in this paper. The threshold program having the trust node and enhancing safty based on the Elliptic Curve digital signature is provided in P2P environment, which uses elliptic encryption technology and safe Elliptic Curves, combining with the threshold system, verifiable secret sharing and proactive secret sharing system. The trust node is responsible for producing the key, the sub-key and distributing sub-key. Then it revokes the key immediately to ensure key security. The threshold signature scheme based on elliptic encryption technology for solving the risks of P2P e-commerce, which architecture of authority is built by trust degree nodes.
引用
收藏
页码:1029 / 1032
页数:4
相关论文
共 50 条
  • [1] Research on Trust Risk of P2P E-commerce
    Wang, Dongjuan
    [J]. 2012 WORLD AUTOMATION CONGRESS (WAC), 2012,
  • [2] Research on the Trust Evaluation Mechanism in P2P E-commerce
    Yan, Bingwen
    Yu, Rongrui
    [J]. 2018 4TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND INFORMATION TECHNOLOGY (ICEMIT 2018), 2018, : 346 - 351
  • [3] The Effect and Strategy Research of the E-Commerce by the Application of P2P
    Li Mingbiao
    Jiang Zhi
    Hu Liping
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 3645 - +
  • [4] The effect and strategy research of the secure E-commerce by the application of P2P
    Li, Mingbiao
    Han, Wenlin
    Park, Jong Hyuk
    Xiong, Naixue
    Li, Zhonghua
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2011, 54 (1-2) : 175 - 183
  • [5] A Trust Model in P2P E-Commerce Systems
    Yu Zhen
    Shen Gui-cheng
    Liu Hai-yan
    [J]. 2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [6] Study of Security Problems in P2P E-commerce
    Lin Ying
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 662 - 665
  • [7] Creditability Assessment of Dealers in P2P E-commerce
    Xie, Xing Long
    [J]. PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 1326 - 1333
  • [8] A P2P E-commerce Related Network Security Issue: P2P Worm
    Zhang, Yejiang
    Li, Zhitang
    Hu, Zhengbing
    Tu, Hao
    Lin, Huaiqing
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 114 - 117
  • [9] Beyond "web of trust": Enabling P2P e-commerce*
    Datta, A
    Hauswirth, M
    Aberer, K
    [J]. IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, : 303 - 312
  • [10] A Trust Evaluation Model for P2P E-Commerce Systems
    Cao, Hui
    Qin, Zheng
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 500 - 505