A secure proxy signature protocol for agent-based M-commerce applications

被引:0
|
作者
Bamasak, O [1 ]
Zhang, N [1 ]
机构
[1] Univ Manchester, Dept Comp Sci, Manchester M13 9PL, Lancs, England
来源
ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS | 2004年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a novel Agent-based Threshold Proxy Signcryption (ATPS) Protocol, which enables an agent owner to securely delegate his signing capabilities to a mobile agent so. that the mobile agent can sign documents on behalf of its owner. The protocol incorporates three novel contributions: a Proxy Key Generation Method, a Threshold Proxy Signcryption Scheme and a Proxy Signature Verification Method. The most notable feature of the protocol is that it enables a mobile agent to securely, efficiently and autonomously sign documents on the owner's behalf in a remote host with non-repudiation and fairness assurance for both the owner and the remote host. The security of the proposed protocol is analyzed and its performance against other related work is evaluated.
引用
收藏
页码:399 / 406
页数:8
相关论文
共 50 条
  • [31] A fair and secure mobile agent environment based on blind signature and proxy host
    Lin, MH
    Chang, CC
    Chen, YR
    COMPUTERS & SECURITY, 2004, 23 (03) : 199 - 212
  • [32] Speech interface: An enhancer to the acceptance of M-commerce applications
    Fan, YD
    Saliba, A
    Kendall, EA
    Newmarch, J
    ICMB 2005: INTERNATIONAL CONFERENCE ON MOBILE BUSINESS, 2005, : 445 - 451
  • [33] An Integrated Model of Continued M-Commerce Applications Usage
    Wen, Chao
    Wang, Nan
    Fang, Jiaming
    Huang, Meng
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2023, 63 (03) : 632 - 647
  • [34] A construction kit for modeling the security of m-commerce applications
    Haneberg, D
    Reif, W
    Stenzel, K
    APPLYING FORMAL METHODS: TESTING, PERFORMANCE, AND M/E- COMMERCE, PROCEEDINGS, 2004, 3236 : 72 - 85
  • [35] Agent-based telecommunications networks for e-commerce applications
    Imhoff, Frank
    Lee, Kuan Lun
    Advances in Automation, Multimedia and Video Systems, and Modern Computer Science, 2001, : 180 - 184
  • [36] M-commerce model by enhanced location privacy protocol in GSM
    Park, M
    Choi, Y
    Jang, K
    INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, 2005, : 388 - 393
  • [37] The Development of Usability Heuristics For Arabic M-Commerce Applications
    Salah, Mohammad S.
    Jusoh, Shaidah
    Muhanna, Muhanna A.
    2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 779 - 784
  • [38] Agent-based Cloud Commerce
    Sim, Kwang Mong
    2009 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1-4, 2009, : 717 - 721
  • [39] A Customer Privacy Protection Protocol on Agent-based Electronic Commerce Transaction
    Chen, Yu-Yi
    Lui, Jun-Chao
    Chen, Shin-, I
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 6 - +
  • [40] Using OCSP to secure certificate-using transactions in m-commerce
    Muñoz, JL
    Forné, J
    Esparza, O
    Soriano, BM
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 280 - 292