期刊文献+

一个基于移动代理的优化支付协议 被引量:1

An Optimistic Payment Protocol Based on Mobile Agents
下载PDF
导出
摘要 移动代理是能在异构网络中漫游的一种软件实体,它极大地改善了分布式系统的性能,被认为在未来的电子商务中必将起到很重要的作用·然而,许多新的安全问题也随之而来·这些安全问题已被看做是移动代理技术得到更广泛应用的主要障碍之一·利用可验证秘密共享和正交验证理论,提出了一个基于移动代理的优化支付协议·协议提供了很好的安全性·同时,在不泄露所购买商品的情况下,能够使移动代理对所购买商品进行验证·另外,最小限度地使用了可信任第3方,除非出现欺诈行为或者协议提前终止,否则可信任的第3方为脱线运行· Mobile agent systems are identified as a programming paradigm that allows flexible structuring of distributed computation over the Internet. It is expected that they will play an important role in the future information society and especially in e-commerce applications. Despite their benefits, their adoption is largely hampered by the new security issues they raise. In this paper, by using verifiable secret sharing scheme and the theory of cross validation, an optimistic payment protocol based on mobile agents is proposed. This protocol can protect the confidentiality of sensitive payment information carried by mobile to receive is the one he is paying for without exposing it someone is misbehaving or prematurely aborting. Moreover, the trusted third party is offline unless
出处 《计算机研究与发展》 EI CSCD 北大核心 2005年第10期1686-1691,共6页 Journal of Computer Research and Development
基金 国家自然科学基金项目(19931010) 国家"九七三"重点基础研究发展规划基金项目(G1999035803)
关键词 移动代理 优化支付协议 可验证秘密共享 正交验证理论 脱线 mobile agents optimistic payment protocol verifiable secret sharing theory of cross validation offline
  • 相关文献

参考文献7

  • 1N. Borselius. Mobile agent security. Journal of Electronics & Communication Engineering, 2002, 14(5): 211~218.
  • 2Fritz Hohl. Time limited blackbox security: Protecting mobile agents from malicious host. In: G. Vigna ed. Mobile Agent and Security, Lecture Notes in Computer Science 1419. Berlin:Springer-Verlag, 1998. 92~113.
  • 3M. Perry, Q. Zhang. SITA: Protecting trade agents from malicious host. In: S. Pierre, R. Glitho, eds. Mobile Agents for Telecommunication Applications, Lecture Notes in Computer Science 2164. Berlin: Springer-Verlag, 2001. 173~183.
  • 4Amitabha Das, Yao Gongxuan. A secure payment protocol using mobile agents in an untrusted host environment. In: W. Kou, Y.Yesha, C. J. Tan, eds. Lecture Notes in Computer Science2040. Berlin: Springer-Verlag, 2001. 33~41.
  • 5T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In: Advances in Cryptology-Crypto'91. Berlin: Springer-Verlag, 1991. 129~140.
  • 6Indrakshi Ray, Indrajit Ray. An optimistic fair exchange Ecommerce protocol with automated dispute resolution. In: K.Bauknecht, S. Kumar Madria, G. Pernul, eds. Proceedings of the First Int'l Conf. Electronic Commerce and Web Technologies,Lecture Notes in Computer Science 1875. Berlin: SpringerVerlag, 2000. 84~93.
  • 7Indrakshi Ray, Indrajit Ray. Using compatible keys for secure multicasting in E-commerce. The Second Int'l Workshop on Internet Computing and E-Commerce, Fort Lauderdale, FL,2002.

同被引文献7

  • 1lndrajit Ray,Indrakshi Ray. An optimistic fair exchange E-commerce protocol with automated dispute resolution[A]. Proceedings of the 1st International Conference on Electronic Commerce and Web Technologies. EC-Web 2000. Lecture Notes in Computer Science,1875[C], Berlin: Spinger Verlag, 2000, 84-93.
  • 2Indrajit Ray, Indrakshi Ray. An anonymous fair-exchange Ecommerce protocol [C]. Proceedings of the 1st Intel:national Workshop on Internet Computing and E-Commerce, San Francisco, CA. USA, 2001,1790-1797.
  • 3Indrajit Ray,Indrakshi Ray. Using compatible keys for secure multicasting in E-commerce[C]. The Second Int'l Workshop on Internet Computing and E-Commerce, Fort Lauderdale, FL, 2002.
  • 4Niven I,Zuckerman H S. An introduction to the theory of numbers[M]. John Wiley and Sons, 4th edition, 1980.
  • 5Kaliski B, Robshaw M. The secure use of RSA[J]. Crypto- Bytes, 1995,1(3):7-13.
  • 6Indrajit Ray,Indrakshi Ray. Fair exchange in E-commerce[J]. ACM SIGecom Exchanges, 2002,3(2) : 9-17.
  • 7Indrajit Ray, Indrakshi Ray, Narasimhamurthi N. A fair-exchange protocol with automated dispute resolution[C]. Proceedings of the 14th Annual IFIP WG 11.3 Working Conference on Database Security, Schoorl, The Netherlands,2000.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部