Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication

被引:0
作者
Han, Song [1 ]
Potdar, Vidyasagar [2 ]
Chang, Elizabeth [3 ]
Dillon, Tharam [4 ]
机构
[1] Curtin Univ Technol, Sch Informat Syst, Curtin Business Sch, Perth, WA, Australia
[2] Curtin Univ Technol, DEBI Digital Ecosyst & Business Intelligence Inst, Perth, WA, Australia
[3] Curtin Univ Technol, Sch Informat Syst, Curtin Business Sch, Software Engn, Perth, WA, Australia
[4] Univ Technol Sydney, Fac Informat Technol, Sydney, NSW, Australia
关键词
authentication; digital signature; cryptography; electronic commerce; mobile agents; mutual authentication; private key; privacy; security;
D O I
10.4018/jisp.2007010103
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article introduces a new transaction protocol using mobile agents in electronic commerce. The authors first propose a new model for transactions in electronic commerce, mutual authenticated transactions using mobile agents. They then design a new protocol by this model. Furthermore, the authors analyse the new protocol in terms of authentication, construction, and privacy. The aim of the protocol is to guarantee that the customer is committed to the server, and the server is committed to the customer. At the same time, the privacy of the customer is protected.
引用
收藏
页码:35 / 46
页数:12
相关论文
共 18 条
[1]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[2]  
COURTOIS N, 2004, SHORT SIGNATURES PRO
[3]  
Digital Signature Algorithm (DSA), FED INF PROC STAND, P186
[4]  
Edjali G., 1998, 5th ACM Conference on Computer and Communications Security, P38, DOI 10.1145/288090.288102
[5]  
Eklund E, 2006, SEMINAR NETWORK SECU
[6]  
Han S, 2005, 2005 International Conference on Services Systems and Services Management, Vols 1 and 2, Proceedings, P849
[7]  
Han S, 2005, 2005 International Conference on Services Systems and Services Management, Vols 1 and 2, Proceedings, P856
[8]  
Han Sunyoung, 2006, TECHNICAL REPORT
[9]  
Kolaczek G, 2003, TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, P190
[10]  
Kotzanikolaou P., 2000, LNCS, V1841, P289