A secure proxy signature protocol for agent-based M-commerce applications

被引:0
|
作者
Bamasak, O [1 ]
Zhang, N [1 ]
机构
[1] Univ Manchester, Dept Comp Sci, Manchester M13 9PL, Lancs, England
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a novel Agent-based Threshold Proxy Signcryption (ATPS) Protocol, which enables an agent owner to securely delegate his signing capabilities to a mobile agent so. that the mobile agent can sign documents on behalf of its owner. The protocol incorporates three novel contributions: a Proxy Key Generation Method, a Threshold Proxy Signcryption Scheme and a Proxy Signature Verification Method. The most notable feature of the protocol is that it enables a mobile agent to securely, efficiently and autonomously sign documents on the owner's behalf in a remote host with non-repudiation and fairness assurance for both the owner and the remote host. The security of the proposed protocol is analyzed and its performance against other related work is evaluated.
引用
收藏
页码:399 / 406
页数:8
相关论文
共 50 条
  • [21] Usability Evaluation of an M-Commerce System Using Proxy Users
    Novak, Gabriela
    Lundberg, Lars
    HCI INTERNATIONAL 2015 - POSTERS' EXTENDED ABSTRACTS, PT II, 2015, 529 : 164 - 169
  • [22] VoiceXML: An Enhancer to the Acceptance of M-commerce Applications
    Liu Wenyun
    Wang Jinglei
    Sun Xiaomei
    FIRST IITA INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2009, : 739 - 740
  • [23] A service management framework for m-commerce applications
    Shih, G
    Shim, SSY
    MOBILE NETWORKS & APPLICATIONS, 2002, 7 (03): : 199 - 212
  • [24] A Service Management Framework for M-Commerce Applications
    Gary Shih
    Simon S.Y. Shim
    Mobile Networks and Applications, 2002, 7 : 199 - 212
  • [25] An analysis on success factors of M-commerce applications
    Qiao, SA
    Gu, H
    Proceedings of the 2005 International Conference on Management Science & Engineering (12th), Vols 1- 3, 2005, : 172 - 176
  • [26] A context management architecture for m-commerce applications
    Poulcheria, Benou
    Costas, Vassilakis
    OPEN COMPUTER SCIENCE, 2012, 2 (02): : 87 - 117
  • [27] INTEGRATING MOBILE AGENT AND CONTEXT-AWARE WORKFLOW ANALYSIS FOR M-COMMERCE APPLICATIONS
    Lin, Jiazao
    Li, Xining
    Li, Lian
    ICE-B 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON E-BUSINESS, 2010, : 109 - 115
  • [28] Secure M-Commerce Data using Post Quantum Cryptography
    Alam, Md Shoaib
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 649 - 654
  • [29] EZ-Park: An innovative secure M-commerce application
    Adams, J
    Abbadasari, R
    Mukkamala, R
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 348 - 352
  • [30] New WAKE key recovery protocol on M-commerce
    Lee, YH
    Lee, IY
    Lee, HW
    WEB ENGINEERING, PROCEEDINGS, 2003, 2722 : 279 - 280