Communications of the ACM
Anonymity Control in E-Cash Systems
FC '97 Proceedings of the First International Conference on Financial Cryptography
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Security Issues in Mobile Code Systems
Mobile Agents and Security
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Hi-index | 0.00 |
Mobile agents are believed to be playing an important role in future e-commerce systems, offering great flexibility and improved performance. Yet, their adoption is largely hampered by the new security issues they raise. Among them, the most difficult to solve is the issue of protecting mobile agents against malicious hosts. While no known general solution to this problem exists, solutions providing effective protection against specific threats from malicious hosts are possible. In this paper, we propose a secure payment protocol using mobile agents that protects the confidentiality of sensitive payment information from spying by malicious agents. The protocol makes use of Shamir's secret sharing scheme. The security properties of the protocol are proven, and an analysis of its message complexity is provided.