Fair exchange with a semi-trusted third party (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
Efficient verifiable encryption (and fair exchange) of digital signatures
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Real-Time UML: Developing Efficient Objects for Embedded Systems
Real-Time UML: Developing Efficient Objects for Embedded Systems
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Mobile Objects and Mobile Agents: The Future of Distributed Computing?
ECCOP '98 Proceedings of the 12th European Conference on Object-Oriented Programming
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Secure Mobile Agent Digital Signatures with Proxy Certificates
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Supporting fair exchange in mobile environments
Mobile Networks and Applications - Security in mobile computing environments
Optimistic fair exchange of digital signatures
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
This paper aims to present a novel protocol suited to a new scenario of fair signature exchange in the context of autonomous mobile agent based e/m-commerce applications, to which existing fair exchange protocols do not offer an appropriate solution. The new protocol allows a party to delegate to a mobile agent the power of digitally signing a document on its behalf without disclosing its private key, offers the protection of private information related to an exchange, and provides simple off-line signature recovery with the enforcement of misbehaviour penalisation. The protocol analysis is also carried out to prove its security and fairness.