期刊文献+

一种基于代理签名的移动代理安全交易研究 被引量:1

Study of Secure Transactions for Mobile Agent Based on Proxy Signature
下载PDF
导出
摘要 目前,移动代理在不可信环境中存在一个重要缺陷,即不能识别交易的有效性。文章提出了一个安全的未指定代理者的代理签名方案,它解决移动代理在不可信环境中的安全交易问题,新方案对客户和商家双方都具有身份的不可伪造性、不可否认性和交易信息的完整性等特点,实现了客户和商家之间公平交易。描述了新方案,给出了实际实现及应用,并对其安全性进行了分析。 A major problem of mobile agents is apparent inability to authenticate transactions in hostile environments. A secure non-designated proxy signature scheme, which resolves issues for secure transactions with mobile agents in hostile environment is presented. The new scheme achieved following characteristics: the identity of a customer and a shop can't be forged and not be disavoid, and the integrality of transaction information can't be tampered, etc. The new scheme can perform fair transactions between a customer and a shop, The new scheme and its implementation are presented. The security of the scheme is discussed.
作者 邓芳 谷利泽
出处 《计算机工程》 CAS CSCD 北大核心 2007年第6期3-5,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60242002)
关键词 代理签名 移动代理 安全交易 Proxy signature Mobile agent Secure transaction
  • 相关文献

参考文献6

  • 1Object Management Group (OMG) Technical Committee(TC).Mobile Agent System Interoperability Facilities Specification[R].Document orbos/97-10-05,1997-10-05.
  • 2Mambo M,Usuda K,Okamoto E.Proxy Signatures for Delegating Signing Operation[C]//Proc.of the 3^rd ACM Conference on Computer and Communication Security.1996:48-57.
  • 3Lee B,Kim H,Kim K.Secure Mobile Agent Using Strong Non-designated Proxy Signature[C]//Proc.of ACISP.2001:474-486.
  • 4史扬,王小平,曹立明.保护移动Agent的电子交易安全方案[J].同济大学学报(自然科学版),2004,32(8):1080-1082. 被引量:2
  • 5Kotzanikolau P,Burroester M,Chrissikopou V.Secure Transactions with Mobile Agents in Hostile Environments[C]//Proceedings of the 5^th Conference on Information Security and Privacy.Berlin:Springer-Verlag,2000:286-294.
  • 6Lee B,Kim H,Kim K.Strong Proxy Signature and Its Applications[C] //Proc.of International Conference on Information and Communi-cation Security.2001:603-608.

二级参考文献7

  • 1Hohl F.Time limited blackbox security:Protecting mobile agents from malicious hosts[A].Lecture Notes in Computer Science[C].Berlin:Springer Verlag,1998.925-113.
  • 2Chess D,Grosof B,Harrison C,et al.Itinerant agents for mobile computing[R].New York:IBM,1995.
  • 3Tomas S,Christian F.Protecting mobile agents against malicious hosts[A].Lecture Notes in Computer Sciece[C].Berlin:Springer Verlag,1998.44-60.
  • 4Adi S.Efficient signature schemes based on birational permutations[A].Lecture Notes in Computer Science[C].Berlin:Springer Verlag,1993.1-12.
  • 5Kotzanikolaous P,Burmester M,Chrissikopoulos V.Secure transactions with mobile Agents in hostile environments[A].Lecture Notes in Computer Science[C].Berlin:Springer Verlag,2000.289-297.
  • 6Lee B,Kim H,Kim K.Secure mobile agent using strong non-designated proxy signature[A].Lecture Notes in Computer Science[C].Berlin:Springer Verlag,2001.474-486.
  • 7Giovanni V.Cryptographic traces for mobile agents[A].Lecture Notes in Computer Science[C].Berlin:Springer Verlag,1998.137-153.

共引文献1

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部