Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

被引:10
|
作者
Shi, Yang [1 ]
Lin, Jie [2 ]
Xiong, Guoyue [2 ]
Wang, Xiaoping [3 ]
Fan, Hongfei [1 ]
机构
[1] Tongji Univ, Sch Software Engn, 4800 Caoan Highway, Shanghai 201804, Peoples R China
[2] Tongji Univ, Sch Econ & Management, 4800 Caoan Highway, Shanghai 201804, Peoples R China
[3] Tongji Univ, Dept Comp Sci & Technol, 4800 Caoan Highway, Shanghai 201804, Peoples R China
基金
中国国家自然科学基金;
关键词
OBFUSCATION;
D O I
10.1155/2016/4375072
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Considering the security of both the customers' hosts and the eShops' servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer's signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer's requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie-Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [31] A secure mobile agent system using multi-signature scheme in electronic commerce
    Seo, SH
    Lee, SH
    WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET-RELATED SOCIAL ISSUES - HSI 2003, 2003, 2713 : 527 - 536
  • [32] Strong key-insulated secure and energy-aware certificateless authentication scheme for VANETs
    Yang, Minghao
    Chen, Jinhao
    Chen, Yanan
    Ma, Rong
    Kumar, Sachin
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 95
  • [33] Efficient ID-based Key-insulated Multi Signature Scheme without Pairings
    Babu, A. Ramesh
    Gayathri, N. B.
    Reddy, P. Vasudeva
    2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,
  • [34] Strong key-insulated signature scheme supporting multi-helpers in the standard model
    Yu, J. (qduyujia@gmail.com), 1600, Science Press (51):
  • [35] Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
    Zhu, Chunping
    Wang, Xingkai
    Liu, Zhen
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 44 - 64
  • [36] Efficient and Provably Secure Certificateless Parallel Key-Insulated Signature Without Pairing for IIoT Environments
    Xiong, Hu
    Mei, Qian
    Zhao, Yanan
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 310 - 320
  • [37] A secure threshold proxy signature scheme for mobile agent-based electronic commerce transactions
    Liu, Wenqi
    Yang, Jianhua
    Wei, Lei
    SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 454 - +
  • [38] A pairing-free key-insulated certificate-based signature scheme with provable security
    Xiong, Hu
    Wu, Shikun
    Geng, Ji
    Ahene, Emmanuel
    Wu, Songyang
    Qin, Zhiguang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (03): : 1246 - 1259
  • [39] ID-BASED KEY-INSULATED SIGNATURE SCHEME WITH BATCH VERIFICATIONS AND ITS NOVEL APPLICATION
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    Yu, Ching-Wen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (7A): : 4797 - 4810
  • [40] A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
    Liu, Wenling
    Liu, Zhen
    Khoa Nguyen
    Yang, Guomin
    Yu, Yu
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 357 - 377