[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/645620.661254guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Secure Payment Protocol Using Mobile Agents in an Untrusted Host Environment

Published: 26 April 2001 Publication History

Abstract

Mobile agents are believed to be playing an important role in future e-commerce systems, offering great flexibility and improved performance. Yet, their adoption is largely hampered by the new security issues they raise. Among them, the most difficult to solve is the issue of protecting mobile agents against malicious hosts. While no known general solution to this problem exists, solutions providing effective protection against specific threats from malicious hosts are possible. In this paper, we propose a secure payment protocol using mobile agents that protects the confidentiality of sensitive payment information from spying by malicious agents. The protocol makes use of Shamir's secret sharing scheme. The security properties of the protocol are proven, and an analysis of its message complexity is provided.

References

[1]
D. Chaum. Blind signature for untraceable payments. In Proceedings of Crypto'82, Plenum, NY, 1982.
[2]
D. M. Chess. Security issues in mobile code. G. Vigna(Ed), Mobile agent and security, Lecture notes in Computer Science 1419, springer, Berlin, 1998.
[3]
E. Dawson and D. Donovan. Shamir's scheme say it all. Computer & Security(A- 37) E.G. Dougall(Editor) Elsevier Science Publishers B.V. (North-Holland), 1993.
[4]
Y. Tsiounis G. Davida, Y. Frankel and M. Yung. Anonymity control in e-cash systems. In Proc. Financial Cryptography Workshop, pages 1-16, February 1997.
[5]
Fritz Hohl. Time limited blackbox security: Protecting mobile agents from malicious hosts. Mobile agent and security, Lecture notes in Computer Science 1419, springer, Berlin, 1998.
[6]
T. Sander and C. Tschudin. Towards mobile cryptography. Technical Report TR-97-049, International Computer Science Institute, Berkeley, November 1997.
[7]
A. Shamir. How to share a secret. Communications of the ACM, 22, November 1979.
[8]
V. Swarup W. Farmer, J. Guttmann. Security for mobile agents: Issues and requirements. In Proceedings of the National Information Systems Security Conference, 1996.
[9]
Digicash website. http://www.digicash.com.
[10]
J. Zhou and D. Gollmann. A fair non-repudiation protocol. In Proceedings of 1996 IEEE Symposium on Security and privacy, Oakland, CA, May 1996.

Cited By

View all
  • (2003)Payment agentsPayment technologies for E-commerce10.5555/886329.886336(149-170)Online publication date: 1-Jan-2003
  • (2003)(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutionsACM Transactions on Internet Technology (TOIT)10.1145/643477.6434793:1(28-48)Online publication date: 1-Feb-2003
  1. A Secure Payment Protocol Using Mobile Agents in an Untrusted Host Environment

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      ISEC '01: Proceedings of the Second International Symposium on Topics in Electronic Commerce
      April 2001
      186 pages
      ISBN:3540419632

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 26 April 2001

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 01 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2003)Payment agentsPayment technologies for E-commerce10.5555/886329.886336(149-170)Online publication date: 1-Jan-2003
      • (2003)(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutionsACM Transactions on Internet Technology (TOIT)10.1145/643477.6434793:1(28-48)Online publication date: 1-Feb-2003

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media