期刊文献+

基于代理签名的移动代理电子商务 被引量:1

Mobile Agent E-commence Based on Proxy Signature
在线阅读 下载PDF
导出
摘要 移动代理可以在异构网络的主机上自主执行,被移动用户用以进行交易。在不可信环境中,移动代理不能识别交易的有效性,导致交易不公平。针对上述情况,给出基于代理签名的移动代理电子商务模型,提出一种应用于该模型的代理数字签名方案,分析证明该方案是安全的,具有短签名的优点,适用于窄带宽应用。 Mobile Agents can be executed in heterogeneous network and used by mobile users for transactions, but they can not authenticate transactions in hostile environment, so the transactions may be unfair. This paper proposes a mobile Agent E-commerce model based on proxy signature, and gives a proxy signature scheme applied in the model, which is proved secure and suitable for low bandwidth situation because of its short signature property.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第17期126-128,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60673079 60572155) 教育部博士点基金资助项目(20060248008)
关键词 移动代理 电子商务 代理签名 短签名 mobile Agent E-commerce proxy signature short signature
  • 相关文献

参考文献6

  • 1Oshimam L. Sevengeod Reasons for Mobile Agents[J]. Communications of the ACM, 1999, 42(3): 88-89.
  • 2张大陆,林晨.移动代理在电子商务中的安全模型研究[J].计算机应用,2005,25(6):1271-1273. 被引量:3
  • 3Mambo K U, Okamoto E. Proxy Signatures: Delegation of the Power to Sign Messages[J] IEICE Trans. on Fundamentals, 1996, 79(9): 1338-1353.
  • 4Lee B, Kim H, Kim K. Secure Mobile Agent Using Strong Non-designated Proxy Signatures[C]//Proe. of Conference on Information and Security and Privacy. Berlin, Germany: Spring- Verlag, 2001.
  • 5Boneh D, Lynn B, Shacham H. Short Signatures from the Weil Pairing[C]//Proc. of Cryptology'04. Berlin, Germany: Springer- Verlag, 2004:297-319.
  • 6Cha J C, Cheon J H. An Identity-based Signature from Gap Diffie- Hellman Groups[C]//Proc. of CRYPTOGRAPHY'03. Berlin, Germany: Springer-Verlag, 2003: 18-30.

二级参考文献10

  • 1LANGE DB, OSHIMA M. Seven good reasons for mobile agents[ J].Communications of the ACM, 1999, 42(3): 88 - 89.
  • 2WHITE JE. Telescript technology. Scenes from the electronic marketplace[ EB/OL]. General Magic White Paper, General Magic,1995.
  • 3IBM Aglet Workbench[EB/OL]. World Wide Web Site. http://www. trl. ibm. co. jp/aglets/, 2004.
  • 4GRAY RS, KOTZ D, CYBENKO G, et al.. D'Agents: Security in a MultipleLanguage Mobile-agent System[ J]. Mobile Agents and Security, Lecture Notes in Computer Science, Springer-Verlag, 1998,1419:154 - 187.
  • 5WAHBE R, LUCCO R, ANDERSON T. Efficient Software-Based Fault Isolation[ A]. Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles, ACM SIGOPS Operating Systems Review[ C], 1993. 203 -216.
  • 6OUSTERHOUT JK. Scripting: Higher - Level Programming for the 21st Century[ J]. IEEE Computer, March 1998:23 - 30.
  • 7YOUNG A, YUNG M. Sliding Encryption: A Cryptographic Tool for Mobile Agents[ A]. Proceedings of the 4th International Workshop on Fast Software Encryption[ C], FSE '97, January 1997.
  • 8ORDILLE JJ. When Agents Roam, Who Can You Trust?[A]. Proceedings of the First Conference on Emerging Technologies and Applications in Communications[ C], Portland, OR, May 1996.
  • 9Sander T, TSCHUDIN CF. towards mobile cryptography[ A], Security and Privacy'98, Proceedings of Security and Privacy'98[ C],1998.3 -6.
  • 10PADOVAN B, SACKMANN S, EYMANN T, et al. A Prototype for an Agent based Secure Electronic Marketplace including Reputation Tracking Mechanisms[ A]. Proceedings of the 34th Hawaiian International Conference on Systems Sciences[ C]. Outrigger Wailea Resort, Maui: IEEE Computer Society, 2001.

共引文献2

同被引文献1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部