期刊文献+

新的复合型电子商务安全协议 被引量:4

New compound electronic commerce security protocol
下载PDF
导出
摘要 针对典型电子商务安全协议存在的安全目标单一,不能满足日益增加的安全需求等问题,提出了一种能够满足多种安全属性的复合型电子商务安全协议,该协议包含认证子协议和支付子协议两部分。认证子协议基于令牌概念实现了高效认证及协商会话密钥。改进匿名电子现金支付协议,提出了支付子协议,引入电子证书证明交易主体的身份,确保协议非否认性的实现;借助可信方传递付款收据,避免交易主体不诚实所导致的公平性缺失;引入FTP传输方式传送电子货币和付款收据,确保实现可追究性与公平性,进一步增强协议的鲁棒性。 In response on the existing problems of the electronic commerce protocols,e.g.security goal is single,increasing security requires are not been satisfied.The paper proposes a compound security protocol,which has general security properties required by e-commerce protocols.The new protocol includes authentication sub-protocol and payment sub-protocol.The authentication subprotocol can authenticate identities of important entity in the foremost time,as well as session keys used for transaction are negotiated efficiently.The payment sub-protocol is designed by improving the anonymous e-cash payment protocol.To realize its nonrepudiation,certificates are used to prove the identities of the transaction entities.To avoid unfairness arisen by the dishonest transaction entities,the transmission of payment receipt is achieved by the trusted party.The proposed protocol uses FTP to transmit electronic cashes and payment receipts,which ensures achievement of accountability and fairness,and enhances the robustness of the protocol.
作者 陈莉 郭清溥
出处 《计算机工程与应用》 CSCD 北大核心 2010年第11期14-17,共4页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863)No.2007AA01Z471 国家自然科学基金No.60473021 河南省重点科技攻关项目(No.072102210029) 河南省科技攻关计划No.0624260017~~
关键词 复合型安全协议 安全属性 认证性 非否认性 公平性 compound security protocol security property authentication non-repudiation fairness
  • 相关文献

参考文献8

  • 1Medvinsky G,Neuman B C.Netcash:A design of practical electronic currency on the Internet[C]//Proceedings of the First ACM Conference on Computer and Communications Security.USA:ACM Press,1993:102-106.
  • 2Deng R H,Gong L.Practical protocols for certified electronic mail[J].Journal of Network and Systems Management,1996,4(3):279-297.
  • 3阮峰,候建敏,张中秋,范志勇.一种乐观电子商务协议的公平性分析[J].计算机工程与应用,2009,45(35):84-87. 被引量:1
  • 4Hernandez-Ardieta J,Gonzalez-Tablasa A.Alvareza R B.An optimistic fair exchange protocol based on signature policies[J].Computers & Security,2008,27(7/8):309-322.
  • 5王茜,杨德礼.一种基于SVO逻辑的新形式化验证方法[J].计算机集成制造系统-CIMS,2004,10(3):342-351. 被引量:6
  • 6文静华,张梅,李祥.ISI协议的符号模型检验分析[J].电讯技术,2005,45(6):80-83. 被引量:2
  • 7刘义春,张焕国.电子商务协议的串空间分析[J].计算机科学,2008,35(2):109-114. 被引量:6
  • 8Zhang H,Zhu Y.A new authentication and key manage ment scheme of WLAN[C]//Proceedings First International Conference on Communications and Networking in China.Beijing,China,2006:1-5.

二级参考文献54

  • 1谢晓尧,张焕国.基于有穷自动机模型的电子商务支付协议公平性研究[J].计算机应用,2004,24(6):13-15. 被引量:6
  • 2黎波涛,罗军舟.不可否认协议时限性的形式化分析[J].软件学报,2006,17(7):1510-1516. 被引量:13
  • 3Asokan N,Sehunter M,Waidner M.Optimistie protocols for fair exchange[C]//Proceedings of the 4th ACM Conference on Computer and Communications Security,Zurich,Switzerland,Association for Computing Machinery,New York, 1997:7-17.
  • 4Syverson P F,Van Oorscho P C.A Unified Cryptographie Protocol Logies,NRL Publication 5540-227[R].Naval Research Lab,Washington, DC, USA, 1996.
  • 5Burrows M,Abadi M,Needham R.A logic of authentication[J].ACM Transactions in Computer systems, 1990,8( 1 ) : 18-36.
  • 6Zhou J,Gollmann D.Towards verification of non-repudiation protocols[C]//Intemational Refinement Workshop and Formal Methods Pacific.Canberra, Australia : Springer-Verlag, 1998 : 370-380.
  • 7Alaraj A,Munro M.An e-Commerce fair exchange protocol for exchanging digital products and payments[C]//Proceedings of the ICDIM. Lyon, France : IEEE Computer Society Press,2007 : 248-253.
  • 8Asokan N.Fairness in Electronic Commerce[D].University of Waterloo, 1998-05.
  • 9Ray I,Ray I,Natarajan N.An anonymous and failure resilient fairexchange e-commerce protocol[J].Decision Support Systems,2005,39 (3) : 267-292.
  • 10Tygar D.Atomicity versus Anonymity:Distributed Transactions for Electronic Commerce[C]//Proc of the 24th Conf on Very Large Databases( VLDB' 98 ), Aug. 1998.

共引文献9

同被引文献26

  • 1张琳.基于PKI的电子商务安全研究[J].电子科技大学学报,2009,38(S1):101-103. 被引量:10
  • 2马强,赵红平.企业在电子商务环境下的供应链管理研究[J].现代管理科学,2007(1):46-47. 被引量:1
  • 3RIVEST R, SHAMIR A. PayWord and MicroMint:Two simple micro payment protocols [ C ]//Proc. Security Protocols, LNCS1189, Berlin: Springer-verlag, 1996: 69-88.
  • 4CHEN L,KUDLA C, PATERSON K C. Concurrent signatures [ C ]// Theory and Application of Cryptographic Techniques. Advances in Cryptology-EUROCRYPT 2004. Berlin: Springer ,2004 : 287-305.
  • 5Sakakibara M. Heterogeneity of Firm Capabilities and Cooperative Researeh and Development: An EmPirical Examination of Motives [J]. Strategic Management Journals 1997,18( sl ):143-164.
  • 6Vanderhaeghen, D.L., Peter. Distributed Model Management Platform for Cross-enterprise Business Process Management in Virtual Enterprise Networks[J]. Journal of Intelligent Manufacturing, 2007,18( 5 ):553-559.
  • 7Afuah A.Tucci C.L. Intemet Business Models and Strategies:Text and Case[M].MeGraw-Hill Higher Education,2001.
  • 8Brass, D.J., Galaskiewicz, J., Greve H.R.,etaI.Taking stock of networks and organizations A multilevel perspective[J]. Academy of Management Journal, 2004,47( 6 ):797-817.
  • 9樊利民,廖建新.公平的移动小额支付协议[J].电子与信息学报,2007,29(11):2599-2602. 被引量:9
  • 10Lai S T. SECURITY REQUIREMENT QUALITY MEASUREMENT MODEL FOR REDUCING E-COMM -ERCE SECURITY RISK[J]. International Journal of SoRware Engineering & Applications, 2014, 5(1):31-42.

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部