Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2016, Article ID 4375072, 18 pages
http://dx.doi.org/10.1155/2016/4375072
Research Article

Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

1School of Software Engineering, Tongji University, 4800 Cao’an Highway, Shanghai 201804, China
2School of Economics and Management, Tongji University, 4800 Cao’an Highway, Shanghai 201804, China
3Department of Computer Science and Technology, Tongji University, 4800 Cao’an Highway, Shanghai 201804, China

Received 17 September 2015; Revised 30 March 2016; Accepted 11 April 2016

Academic Editor: Laurence T. Yang

Copyright © 2016 Yang Shi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. Singh and M. Dave, “Antecedence graph approach to checkpointing for fault tolerance in mobile agent systems,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 247–258, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  2. F. Raji and B. T. Ladani, “Anonymity and security for autonomous mobile agents,” IET Information Security, vol. 4, no. 4, pp. 397–410, 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. P. Kotzanikolaou, M. Burmester, and V. Chrissikopoulos, “Secure transactions with mobile agents in hostile environments,” in Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10–12, 2000. Proceedings, vol. 1841 of Lecture Notes in Computer Science, pp. 289–297, Springer, Berlin, Germany, 2000. View at Publisher · View at Google Scholar
  4. B. Lee, H. Kim, and K. Kim, “Secure mobile agent using strong non-designated proxy signature,” in Information Security and Privacy, Proceedings, pp. 474–486, Springer, Berlin, Germany, 2001. View at Google Scholar
  5. S. Han, E. Chang, and T. Dillon, “Secure e-transactions using mobile agents with agent broker,” in Proceedings of the International Conference on Services Systems and Services Management (ICSSSM '05), vol. 2, pp. 849–855, IEEE, June 2005. View at Publisher · View at Google Scholar · View at Scopus
  6. N. Borselius, C. J. Mitchell, and A. Wilson, “Undetachable threshold signatures,” in Proceedings of the 8th IMA International Conference on Cryptography and Coding, pp. 239–244, Cirencester, UK, December 2001.
  7. Y. Shi, L. Cao, and X. Wang, “A security scheme of electronic commerce for mobile agents uses undetachable digital signatures,” in Proceedings of the 3rd International Conference on Information Security (InfoSecu '04), pp. 242–243, November 2004. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Shi, X. P. Wang, L. M. Cao, and J. X. Ren, “Secure mobile agents in electronic commerce by using undetachable signatures from pairings,” in Shaping Business Strategy in a Networked World, Vols 1 and 2, Proceedings, pp. 1038–1043, 2004. View at Google Scholar
  9. Y. Shi and G. Xiong, “An undetachable threshold digital signature scheme based on conic curves,” Applied Mathematics and Information Sciences, vol. 7, no. 2, pp. 823–828, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. Y. Shi, Q. Zhao, and Q. Liu, “Secure mobile agents in eCommerce with forward-secure undetachable digital signatures,” ETRI Journal, vol. 37, no. 3, pp. 573–583, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. D. Milojicic, M. Breugst, I. Busse et al., “MASIF: the OMG mobile agent system interoperability facility,” Personal Technologies, vol. 2, no. 2, pp. 117–129, 1998. View at Google Scholar
  12. A. Corradi, M. Cremonini, R. Montanari, and C. Stefanelli, “Mobile agents integrity for electronic commerce applications,” Information Systems, vol. 24, no. 6, pp. 519–533, 1999. View at Publisher · View at Google Scholar · View at Scopus
  13. A. Corradi, R. Montanari, and C. Stefanelli, “Security of mobile agents on the Internet,” Internet Research, vol. 11, no. 1, pp. 84–95, 2001. View at Publisher · View at Google Scholar · View at Scopus
  14. F. Huseynov, S. Y. Huseynov, and S. O zkan, “The influence of knowledge-based e-commerce product recommender agents on online consumer decision-making,” Information Development, vol. 32, no. 1, pp. 81–90, 2015. View at Publisher · View at Google Scholar
  15. M. Cao, X. Luo, X. Luo, and X. Dai, “Automated negotiation for e-commerce decision making: a goal deliberated agent architecture for multi-strategy selection,” Decision Support Systems, vol. 73, pp. 1–14, 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. B. M. Balachandran and M. Mohammadian, “Development of a fuzzy-based multi-agent system for E-commerce Settings,” in Knowledge-Based and Intelligent Information & Engineering Systems 19th Annual Conference, KES-2015, L. Ding, C. Pang, L. M. Kew, L. C. Jain, and R. J. Howlett, Eds., Procedia Computer Science, pp. 593–602, Elsevier Science, Amsterdam, The Netherlands, 2015. View at Google Scholar
  17. A. J. C. Trappey, C. V. Trappey, and F. T. L. Lin, “Automated silicon intellectual property trade using mobile agent technology,” Robotics and Computer-Integrated Manufacturing, vol. 22, no. 3, pp. 189–202, 2006. View at Publisher · View at Google Scholar · View at Scopus
  18. Y.-F. Chung, Y.-T. Chen, T.-L. Chen, and T.-S. Chen, “An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce,” Expert Systems with Applications, vol. 38, no. 8, pp. 9900–9907, 2011. View at Publisher · View at Google Scholar · View at Scopus
  19. G. Wang, T. N. Wong, and X. H. Wang, “A hybrid multi-agent negotiation protocol supporting agent mobility in virtual enterprises,” Information Sciences, vol. 282, pp. 1–14, 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. A. Aloui, O. Zerdoumi, and O. Kazar, “Architecture for mobile business based on mobile agent,” in Proceedings of the International Conference on Multimedia Computing and Systems (ICMCS '12), pp. 954–958, May 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. B. Wyseur, White-Box Cryptography, Katholieke Universiteit, Heverlee, Belgium, 2009.
  22. S. Chow, P. Eisen, H. Johnson, and P. C. Van Oorschot, “A white-box DES implementation for DRM applications,” in Digital Rights Management, pp. 1–15, Springer, Berlin, Germany, 2003. View at Google Scholar
  23. O. Esparza, J. L. Muñoz, J. Tomãs-Buliart, and M. Soriano, “An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking,” Wireless Communications & Mobile Computing, vol. 11, no. 11, pp. 1446–1462, 2011. View at Publisher · View at Google Scholar · View at Scopus
  24. F. Hohl, “Time limited blackbox security: protecting mobile agents from malicious hosts,” in Mobile Agents and Security, vol. 1419 of Lecture Notes in Computer Science, pp. 92–113, Springer, Berlin, Germany, 1998. View at Publisher · View at Google Scholar
  25. T. Sander and C. Tschudin, “Protecting mobile agents against malicious hosts,” in Mobile Agents and Security, pp. 44–60, Springer, Berlin, Germany, 1998. View at Google Scholar
  26. D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the Weil pairing,” Journal of Cryptology, vol. 17, no. 4, pp. 297–319, 2004. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  27. Y. Dodis, J. Katz, S. Xu, and M. Yung, “Key-insulated public key cryptosystems,” in Advances in Cryptology—EUROCRYPT 2002, pp. 65–82, Springer, Berlin, Germany, 2002. View at Google Scholar
  28. Y. Dodis, J. Katz, S. Xu, and M. Yung, “Strong key-insulated signature schemes,” in Public Key Cryptography, vol. 2567 of Lecture Notes in Computer Science, pp. 130–144, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar · View at MathSciNet
  29. D. Pointcheval and J. Stern, “Security proofs for signature schemes,” in Advances in Cryptology—EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12–16, 1996 Proceedings, vol. 1070 of Lecture Notes in Computer Science, pp. 387–398, Springer, Berlin, Germany, 1996. View at Publisher · View at Google Scholar
  30. D. Pointcheval and J. Stern, “Security arguments for digital signatures and blind signatures,” Journal of Cryptology, vol. 13, no. 3, pp. 361–396, 2000. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  31. J. C. Choon and J. H. Cheon, “An identity-based signature from gap Diffie-Hellman groups,” in Public Key Cryptography—PKC 2003, pp. 18–30, Springer, Berlin, Germany, 2002. View at Google Scholar
  32. D. M. Freeman and T. Satoh, “Constructing pairing-friendly hyperelliptic curves using Weil restriction,” Journal of Number Theory, vol. 131, no. 5, pp. 959–983, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  33. T. Kim, S. Kim, and J. H. Cheon, “On the final exponentiation in tate pairing computations,” IEEE Transactions on Information Theory, vol. 59, no. 6, pp. 4033–4041, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  34. Y. Kawahara, T. Kobayashi, G. Takahashi, and T. Takagi, “Faster maptopoint on supersingular elliptic curves in characteristic 3,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 94, no. 1, pp. 150–155, 2011. View at Publisher · View at Google Scholar · View at Scopus
  35. G. Barthe, B. Grégoire, S. Heraud, F. Olmedo, and S. Zanella-Béguelin, “Verified indifferentiable hashing into elliptic curves,” Journal of Computer Security, vol. 21, no. 6, pp. 881–917, 2013. View at Publisher · View at Google Scholar · View at Scopus
  36. R. R. Farashahi, P.-A. Fouque, I. E. Shparlinski, M. Tibouchi, and J. F. Voloch, “Indifferentiable deterministic hashing to elliptic and hyperelliptic curves,” Mathematics of Computation, vol. 82, no. 281, pp. 491–512, 2013. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  37. S. Hada, “Secure obfuscation for encrypted signatures,” in Advances in Cryptology—EUROCRYPT 2010, vol. 6110 of Lecture Notes in Computer Science, pp. 92–112, Springer, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  38. R. Nishimaki and K. Xagawa, “Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES,” Designs, Codes and Cryptography, vol. 77, no. 1, pp. 61–98, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  39. Y. Shi, Q. Zhao, H. Fan, and Q. Liu, “Secure obfuscation for encrypted group signatures,” PLoS ONE, vol. 10, no. 7, Article ID e0131550, 2015. View at Publisher · View at Google Scholar · View at Scopus
  40. A. De Caro and V. Iovino, “jPBC: java pairing based cryptography,” in Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC '11), pp. 850–855, Kerkyra, Greece, July 2011. View at Publisher · View at Google Scholar · View at Scopus
  41. JADE, “JAVA Agent DEvelopment Framework,” http://jade.tilab.com/.
  42. A. C. L. Fipa, Message Structure Specification, Foundation for Intelligent Physical Agents, 2002.