Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

被引:10
|
作者
Shi, Yang [1 ]
Lin, Jie [2 ]
Xiong, Guoyue [2 ]
Wang, Xiaoping [3 ]
Fan, Hongfei [1 ]
机构
[1] Tongji Univ, Sch Software Engn, 4800 Caoan Highway, Shanghai 201804, Peoples R China
[2] Tongji Univ, Sch Econ & Management, 4800 Caoan Highway, Shanghai 201804, Peoples R China
[3] Tongji Univ, Dept Comp Sci & Technol, 4800 Caoan Highway, Shanghai 201804, Peoples R China
基金
中国国家自然科学基金;
关键词
OBFUSCATION;
D O I
10.1155/2016/4375072
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Considering the security of both the customers' hosts and the eShops' servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer's signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer's requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie-Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [1] Identity-based undetachable digital signature for mobile agents in electronic commerce
    Yang Shi
    Jingxuan Han
    Jiangfeng Li
    Guoyue Xiong
    Qinpei Zhao
    Soft Computing, 2018, 22 : 6921 - 6935
  • [2] Identity-based undetachable digital signature for mobile agents in electronic commerce
    Shi, Yang
    Han, Jingxuan
    Li, Jiangfeng
    Xiong, Guoyue
    Zhao, Qinpei
    SOFT COMPUTING, 2018, 22 (20) : 6921 - 6935
  • [3] An Efficient Key-Insulated Signature Scheme
    Liang, Xiangqian
    Wang, Yandong
    Gao, Dezhi
    Zhang, Yonghua
    ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 29 - +
  • [4] A new key-insulated signature scheme
    González-Deleito, N
    Markowitch, O
    Dall'Olio, E
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 465 - 479
  • [5] Secure mobile agents in electronic commerce by using undetachable signatures from pairings
    Shi, Y
    Wang, XP
    Cao, LM
    Ren, JX
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1038 - 1043
  • [6] An efficient threshold key-insulated signature scheme
    Chen J.-H.
    Long Y.
    Chen K.-F.
    Wang Y.-T.
    Li X.-X.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (6) : 658 - 662
  • [7] An Efficient Threshold Key-Insulated Signature Scheme
    陈剑洪
    龙宇
    陈克非
    王永涛
    李祥学
    Journal of Shanghai Jiaotong University(Science), 2011, 16 (06) : 658 - 662
  • [8] Strongly secure certificateless key-insulated signature secure in the standard model
    Yanan Chen
    Weixiang Xu
    Hu Xiong
    annals of telecommunications - annales des télécommunications, 2015, 70 : 395 - 405
  • [9] Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET
    Park, Youngho
    Sur, Chul
    Jung, Chae Duk
    Rhee, Kyung-Hyune
    MOBILE LIGHTWEIGHT WIRELESS SYSTEMS, 2009, 13 : 35 - 44
  • [10] Strongly secure certificateless key-insulated signature secure in the standard model
    Chen, Yanan
    Xu, Weixiang
    Xiong, Hu
    ANNALS OF TELECOMMUNICATIONS, 2015, 70 (9-10) : 395 - 405