Communications of the ACM
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Identity-Based and Self-Certified Key-Exchange Protocols
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
A note on Girault's self-certified model
Information Processing Letters
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Itinerant Agents for Mobile Computing
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
This paper proposes two appropriate security schemes for protecting consumer electronic applications in mobile agent based networks. As far as mobile agent security is concerned, we develop a proxy signature scheme for protecting mobile agents against malicious agent hosts using the ECC-based self-certified public key cryptosystem. The proposed proxy signature scheme can protect users' private keys, and provide the fairness of contracts signed by agents. In addition, based on the proposed proxy signature scheme, we further design a proxy authenticated encryption scheme so that the signature of the contracts will satisfy users' constraints, and the non-repudiation of servers can be achieved. Furthermore, we also implement the proposed security schemes to achieve security requirements of confidentiality, integrity, and non-repudiation for protecting Linux-based mobile agents in an electronic auction application. Hence, we affirm that the proposed security schemes are suitable for protecting consumer electronic applications in mobile-agent-based network environments.