A secure payment protocol using mobile agents in an untrusted host environment

被引:0
|
作者
Das, A [1 ]
Yao, CX [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
来源
ELECTRONIC COMMERCE TECHNOLOGIES, PROCEEDINGS | 2001年 / 2040卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile agents are believed to be playing an important role in future e-commerce systems, offering great flexibility and improved performance. Yet, their adoption is largely hampered by the new security issues they raise. Among them, the most difficult to solve is the issue of protecting mobile agents against malicious hosts. While no known general solution to this problem exists, solutions providing effective protection against specific threats from malicious hosts are possible. In this paper, we propose a secure payment protocol using mobile agents that protects the confidentiality of sensitive payment information from spying by malicious agents. The protocol makes use of Shamir's secret sharing scheme. The security properties of the protocol axe proven, and an analysis of its message complexity is provided.
引用
收藏
页码:33 / 41
页数:9
相关论文
共 50 条
  • [31] A secure protocol for a payment system based on a kiosk centric case mobile scenario
    Tellez, Jesus A.
    Sierra, Jose M.
    Izquierdo, Antonio
    Carbonell, Mildrey
    INGENIERIA UC, 2006, 13 (02): : 25 - 32
  • [32] A secure virtual execution environment for untrusted code
    Wen, Yan
    Wang, Huaimin
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 156 - 167
  • [33] Efficient and Secure NFC Authentication for Mobile Payment Ensuring Fair Exchange Protocol
    Thammarat, Chalee
    SYMMETRY-BASEL, 2020, 12 (10): : 1 - 19
  • [34] NFC Secure Payment and Verification Scheme for Mobile Payment
    Fan, Kai
    Song, Panfei
    Du, Zhao
    Zhu, Haojin
    Li, Hui
    Yang, Yintang
    Li, Xinghua
    Yang, Chao
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016, 2016, 9798 : 116 - 125
  • [35] A lightweight and private mobile payment protocol by using mobile network operator
    Fun, Tan Soo
    Beng, Leau Yu
    Likoh, Jonathan
    Roslan, Rozaini
    2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3, 2008, : 162 - 166
  • [36] A Secure Payment Protocol with Accountability Properties
    Techapanupreeda, Chian
    Chokngamwong, Roongroj
    2016 20TH INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2016,
  • [37] Secure Anonymous Authentication Protocol with Unlinkability for Mobile Wireless Environment
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    2012 INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2012,
  • [38] Using secure mobile agents as information brokers
    Bhoopalam, KP
    Mukkamala, R
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS: I, 2003, : 28 - 33
  • [39] Secure transactions using mobile agents with TTP
    Han, S
    Chang, E
    Dillon, T
    2005 International Conference on Services Systems and Services Management, Vols 1 and 2, Proceedings, 2005, : 856 - 862
  • [40] Secure mobile terminal used to payment
    Li, Xi
    Hu, Hanping
    Wang, Yi
    Wang, Maocai
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2008, 36 (11): : 28 - 31