Secure Transactions with Mobile Agents in Hostile Environments
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
A Digital Nominative Proxy Signature Scheme for Mobile Communication
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A Secure Mobile Agent System Applying Identity-Based Digital Signature Scheme
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Security Issues in Mobile Code Systems
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Cryptographic Security for Mobile Code
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
An Identity-based Ring Signature Scheme from Bilinear Pairings
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
Short Signatures from the Weil Pairing
Journal of Cryptology
Secure Mobile Agents with Designated Hosts
NSS '09 Proceedings of the 2009 Third International Conference on Network and System Security
A secure mobile agent system using multi-signature scheme in electronic commerce
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
Collusion-Free policy-based encryption
ISC'06 Proceedings of the 9th international conference on Information Security
Policy-based cryptography and applications
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
A new proxy signature scheme providing self-delegation
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Hi-index | 0.00 |
Mobile agents have exhibited many useful applications in ecommerce. Security is critical to ensure a success of mobile agent applications. There exist several solutions for mobile agent security. Amongst these solutions, the proxy-based model is believed to be a sound solution to provide authentication, where the visiting host of an agent acts as a proxy signer who can sign an offer. However, any host (including a malicious host) could act as the signer. To solve this problem, a secure policy-based mobile agent scheme is proposed in this paper. That is, only the hosts who satisfy the designated policies can generate a valid signature. We also provide a security model and a rigorous security proof for our proposed scheme.