期刊文献+

保护移动Agent的电子交易安全方案 被引量:2

Security Scheme of Electronic Transactions for Mobile Agents
下载PDF
导出
摘要 根据对移动Agent在恶意主机上安全问题的分析 ,给出了一个安全的电子交易方案 .该方案改进了强代理签名安全机制 ,使用不可拆分数字签名技术、公钥加密算法和时间戳 ,可以保证客户身份不可仿冒且要求不可拆分、商家身份不可仿冒且开价不可拆分、商家的身份和开价信息对其他商家保密 ,同时还可以抵抗客户或商家通过重放攻击来迫使对方进行额外的交易 . Based on the analysis of security problems in malicious hosts,a scheme of secure electronic transactions is proposed.This scheme has improved the strong proxy signature scheme by using undetachable digital signatures technique,public key encryption algorithms and time stamps.It achieved following characteristics:first,the identity of a shop and a customer can not be forged;second,the requirements of a customer and the bid of a shop can not be detached;third,the identity and the bid information of a shop keep private against other shops;finally,it's able to resist replay attacks.
出处 《同济大学学报(自然科学版)》 EI CAS CSCD 北大核心 2004年第8期1080-1082,共3页 Journal of Tongji University:Natural Science
基金 国家自然科学基金资助项目 (70 1710 61)
关键词 移动AGENT 电子交易 不可拆分数字签名 mobile Agents electronic transactions undetachable digital signatures
  • 相关文献

参考文献7

  • 1Hohl F.Time limited blackbox security:Protecting mobile agents from malicious hosts[A].Lecture Notes in Computer Science[C].Berlin:Springer Verlag,1998.925-113.
  • 2Chess D,Grosof B,Harrison C,et al.Itinerant agents for mobile computing[R].New York:IBM,1995.
  • 3Tomas S,Christian F.Protecting mobile agents against malicious hosts[A].Lecture Notes in Computer Sciece[C].Berlin:Springer Verlag,1998.44-60.
  • 4Adi S.Efficient signature schemes based on birational permutations[A].Lecture Notes in Computer Science[C].Berlin:Springer Verlag,1993.1-12.
  • 5Kotzanikolaous P,Burmester M,Chrissikopoulos V.Secure transactions with mobile Agents in hostile environments[A].Lecture Notes in Computer Science[C].Berlin:Springer Verlag,2000.289-297.
  • 6Lee B,Kim H,Kim K.Secure mobile agent using strong non-designated proxy signature[A].Lecture Notes in Computer Science[C].Berlin:Springer Verlag,2001.474-486.
  • 7Giovanni V.Cryptographic traces for mobile agents[A].Lecture Notes in Computer Science[C].Berlin:Springer Verlag,1998.137-153.

同被引文献14

  • 1谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 2Hohl F. Time limited blackbox security: protecting mobile agents against malicious hosts [C]//Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1998: 92-113.
  • 3Schelderup K, Lones J. Mobile agent security issues and directions[C]// IS&N' 99. Hamburg: Spring-Verlag, 1999: 157-167.
  • 4Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature [C] //Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2001: 474-486.
  • 5Wang Changjie, Ho-fung L. Mobile agents for secure electronic commerce transactions with privacy protection of the customers [C] // The 2005 IEEE International Conference on EEE05. [S. l.] : IEEE, 2005: 530-535.
  • 6Schneier B. Applied cryptography [M] . 2nd ed. New York: John Wiley & Sons, 1996.
  • 7Kotzanikolaous P, Burmester M, Chrissikopoulos V. Secure transactions with mobile agents in hostile environments[C] // Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2000: 289-297.
  • 8Object Management Group (OMG) Technical Committee(TC).Mobile Agent System Interoperability Facilities Specification[R].Document orbos/97-10-05,1997-10-05.
  • 9Mambo M,Usuda K,Okamoto E.Proxy Signatures for Delegating Signing Operation[C]//Proc.of the 3^rd ACM Conference on Computer and Communication Security.1996:48-57.
  • 10Lee B,Kim H,Kim K.Secure Mobile Agent Using Strong Non-designated Proxy Signature[C]//Proc.of ACISP.2001:474-486.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部