Fair signature exchange via delegation on ubiquitous networks

被引:4
作者
Shi, Q. [1 ]
Zhang, N. [2 ]
Merabti, M. [1 ]
机构
[1] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool L3 3AF, Merseyside, England
[2] Univ Manchester, Sch Comp Sci, Manchester M13 9PL, Lancs, England
关键词
Ubiquitous computing; Fair exchange; Signature; Communication protocol; PROTOCOL;
D O I
10.1016/j.jcss.2014.11.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses the issue of autonomous fair signature exchange in emerging ubiquitous (u-) commerce systems, which require that the exchange task be delegated to authorised devices for its autonomous and secure execution. Relevant existing work is either inefficient or ineffective in dealing with such delegated exchange. To rectify this situation, this paper aims to propose an effective, efficient and secure solution to the delegated exchange to support the important autonomy feature offered by u-commerce systems. The proposed work includes a novel approach to symmetric-key based verifiable proxy encryption to make the exchange delegation flexible, efficient and simple to implement on resource-limited devices commonly used in u-commerce systems. This approach is then applied to design a new exchange protocol. An analysis of the protocol is also provided to confirm its security and fairness. Moreover, a comparison with related work is presented to demonstrate its much better efficiency and simplicity. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:615 / 631
页数:17
相关论文
共 25 条
  • [1] [Anonymous], FED INF PROC STAND P
  • [2] Asynchronous protocols for optimistic fair exchange
    Asokan, N
    Shoup, V
    Waidner, M
    [J]. 1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 86 - 99
  • [3] Optimistic fair exchange of digital signatures
    Asokan, N
    Shoup, V
    Waidner, M
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (04) : 593 - 610
  • [4] Ateniese G., 2004, ACM Transactions on Information and Systems Security, V7, P1, DOI 10.1145/984334.984335
  • [5] Efficient and practical fair exchange protocols with off-line TTP
    Bao, F
    Deng, RH
    Mao, WB
    [J]. 1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 77 - 85
  • [6] Camenisch J, 2003, LECT NOTES COMPUT SC, V2729, P126
  • [7] A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS
    ELGAMAL, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) : 469 - 472
  • [8] A family of trusted third party based fair-exchange protocols
    Ezhilchelvan, PD
    Shrivastava, SK
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (04) : 273 - 286
  • [9] Huang Q, 2008, LECT NOTES COMPUT SC, V5350, P74, DOI 10.1007/978-3-540-89255-7_6
  • [10] I. (IETF), 2008, RFC 5246