A secure proxy signature protocol for agent-based M-commerce applications

被引:0
|
作者
Bamasak, O [1 ]
Zhang, N [1 ]
机构
[1] Univ Manchester, Dept Comp Sci, Manchester M13 9PL, Lancs, England
来源
ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS | 2004年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a novel Agent-based Threshold Proxy Signcryption (ATPS) Protocol, which enables an agent owner to securely delegate his signing capabilities to a mobile agent so. that the mobile agent can sign documents on behalf of its owner. The protocol incorporates three novel contributions: a Proxy Key Generation Method, a Threshold Proxy Signcryption Scheme and a Proxy Signature Verification Method. The most notable feature of the protocol is that it enables a mobile agent to securely, efficiently and autonomously sign documents on the owner's behalf in a remote host with non-repudiation and fairness assurance for both the owner and the remote host. The security of the proposed protocol is analyzed and its performance against other related work is evaluated.
引用
收藏
页码:399 / 406
页数:8
相关论文
共 50 条
  • [41] Consumer-based m-commerce: exploring consumer perception of mobile applications
    Mahatanankoon, P
    Wen, HJ
    Lim, B
    COMPUTER STANDARDS & INTERFACES, 2005, 27 (04) : 347 - 357
  • [42] Analysis of the consumer preferences toward m-commerce applications based on an empirical study
    Shin, Yonghee
    Jeon, Hyori
    Choi, Munkee
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 654 - +
  • [43] Development of Heuristics for Usability Evaluation of M-Commerce Applications
    Ajibola, A. S.
    Goosen, L.
    SOUTH AFRICAN INSTITUTE OF COMPUTER SCIENTISTS AND INFORMATION TECHNOLOGISTS (SACSIT 2017), 2017, : 19 - 28
  • [44] M-commerce transaction management with multi-agent support
    Younas, M
    Chao, KM
    Anane, R
    AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 284 - 287
  • [45] Handy broker: An intelligent product-brokering agent for m-commerce applications with user preference tracking
    Guan, Steven
    Ngoo, Chon Seng
    Zhu, Fangming
    Electronic Commerce Research and Applications, 2002, 1 (3-4) : 314 - 330
  • [46] Using principles of pervasive computing to design M-commerce applications
    Kurkovsky, S
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 59 - 64
  • [47] User assigned security policy framework for m-commerce applications
    Aramudhan, M.
    2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3, 2008, : 148 - 150
  • [48] Analysing m-commerce research: technology, applications and research themes
    Kourouthanassis, Panos E.
    Georgiadis, Christos K.
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2014, 12 (01) : 1 - 11
  • [49] An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications
    Such, Jose M.
    Espinosa, Agustin
    Garcia-Fornes, Ana
    ADVANCED AGENT TECHNOLOGY, 2012, 7068 : 411 - 425
  • [50] The Concept of Quality Assurance in M-Commerce Applications in Arabic Societies
    Bahaddad, Adel A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (01): : 758 - 775