期刊文献+

基于移动代理的电子交易安全方案 被引量:1

Mobile Agent-Based Security Scheme of Electronic Transactions
下载PDF
导出
摘要 总结了基于移动代理的电子交易安全需求,在未指定代理者的强代理签名方案的基础上,提出了一种新的安全电子交易方案.新方案增加了客户隐私保护功能,能有效解决代理在多个备选商家主机之间移动时的安全问题,保证了客户和商家双方身份的不可伪造性和交易信息的不可拆分性,可抗重放攻击,实现了各商家之间身份和交易信息的保密.分析表明,新方案满足所有电子交易安全需求,更具实用性. The security requirement for mobile agent-based electronic commerce transactions is summarized. An improved scheme based upon the strong non-designated proxy signature scheme is proposed. The new scheme adds new feature for customer privacy protection and effectively addresses security requirements when mobile agent moves between multiple optional hosts; it also can ensure the unforgeability of customer and shop's identity, prevent reply attack, moreover, it will secret one shop's identity and transaction information against others. The security analysis of the proposed scheme shows that it meets all security requirements summarized in section one.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2006年第4期81-85,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60372094)
关键词 移动代理 电子交易 强代理签名 mobile agent electronic transactions strong proxy signature
  • 相关文献

参考文献10

二级参考文献15

  • 1Mambo M, Usuda K, Okamoto E. Proxy signature:delegation of the power to sign messages[A]. EICE Trans Fundamentals[C]. 1996. 1338-1353. 被引量:1
  • 2Lee B, Kim H, Kim K. Strong proxy signature and it's applications [A]. International Conference on Information and Communication Security, Proc of SCIS[C]. Japan, 2001. 603-608. 被引量:1
  • 3Kim S, Park S, Won D. Proxy signature, revisited[A]. International Conference on Information and Communication Security, Proc of ICICS[C]. Berlin,1997. 223-232. 被引量:1
  • 4Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature FA 1. Proc ACISP[C]. Spring-Verlag, 2001. LNCS 1 334, 474-486. 被引量:1
  • 5Shum K, Wei Victor K. A strong proxy signature scheme with proxy signer privacy protection [EB/OL]. http: // www. computer. org/proceedings/wetice/1748/17480055. pdf, 2002. 被引量:1
  • 6Boyd C. Comment :new digital signature scheme based discrete logarithm[J]. Electronics Letters, 1994, 30(6) : 480-481. 被引量:1
  • 7Wong Chungkei,Secure group communications using key graphs AC Mcomputer communicationreview,1998年,28卷,2期,68页 被引量:1
  • 8Hohl F.Time limited blackbox security:Protecting mobile agents from malicious hosts[A].Lecture Notes in Computer Science[C].Berlin:Springer Verlag,1998.925-113. 被引量:1
  • 9Chess D,Grosof B,Harrison C,et al.Itinerant agents for mobile computing[R].New York:IBM,1995. 被引量:1
  • 10Tomas S,Christian F.Protecting mobile agents against malicious hosts[A].Lecture Notes in Computer Sciece[C].Berlin:Springer Verlag,1998.44-60. 被引量:1

共引文献39

同被引文献7

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部