Identity-based undetachable digital signature for mobile agents in electronic commerce

  • Yang Shi
  • Jingxuan Han
  • Jiangfeng Li
  • Guoyue Xiong
  • Qinpei Zhao
Methodologies and Application
  • 16 Downloads

Abstract

To enable mobile agents signing securely on potentially malicious hosts in electronic commerce and other applications, we proposed the definition and security notion of identity-based undetachable digital signature schemes. More importantly, we proposed a concrete identity-based undetachable digital signature scheme with provable security. In the scheme, mobile agents need not carry the private key when they generate digital signatures on behalf of the original signer, so the private key will not be compromised. The encrypted function is combined with the original signer’s requirement, so misuse of the signing algorithm can be prevented. Moreover, because the scheme is identity-based, verification of the signatures generated by mobile agents does not require either verification of the entire certificate path or communication with the certification authority. Therefore, compared with existing undetachable signature schemes, the cost of verification is reduced and even the dependence on a stable network connection is weakened.

Keywords

Mobile agents Identity-based Undetachable digital signatures Electronic commerce 

Notes

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Nos. 61772371, 61702372, 61202382, 61503286) and the Fundamental Research Funds for the Central Universities.

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

References

  1. Aloui A, Zerdoumi O, Kazar O (2012) Architecture for mobile business based on mobile agent. In: 2012 International conference on paper presented at the multimedia computing and systems (ICMCS), 10–12 May 2012Google Scholar
  2. Arène C, Lange T, Naehrig M, Ritzenthaler C (2011) Faster computation of the Tate pairing. J Number Theory 131:842–857.  https://doi.org/10.1016/j.jnt.2010.05.013 MathSciNetCrossRefMATHGoogle Scholar
  3. Boneh D, Franklin M (2003) Identity-based encryption from the Weil pairing. SIAM J Comput 32:586–615.  https://doi.org/10.1137/S0097539701398521 MathSciNetCrossRefMATHGoogle Scholar
  4. Busch C, Roth V, Meister R (1998) Perspectives on electronic commerce with mobile agents. In: Paper presented at the proceedings of XI amaldi conference on problems of global security, Moscow, RussiaGoogle Scholar
  5. Chung YF, Chen YT, Chen TL, Chen TS (2011) An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce. Exp Syst Appl 38:9900–9907  https://doi.org/10.1016/j.eswa.2011.02.039
  6. De Caro A, Iovino V (2011) jPBC: Java pairing based cryptography. In: 2011 IEEE symposium on paper presented at the computers and communications (ISCC), June 28 2011–July 1 2011Google Scholar
  7. De Mulder Y, Roelse P, Preneel B (2013) Cryptanalysis of the Xiao—Lai White-Box AES Implementation. In: Paper presented at the selected areas in cryptography, 1 Jan 2013Google Scholar
  8. Dodis Y, Katz J, Xu S, Yung M (2003) Strong key-insulated signature schemes. In: Paper presented at the public key cryptography—PKC 2003Google Scholar
  9. Du TC, Li EY, Wei E (2005) Mobile agents for a brokering service in the electronic marketplace. Decis Support Syst 39:371–383.  https://doi.org/10.1016/j.dss.2004.01.003 CrossRefGoogle Scholar
  10. Esparza O, Munoz JL, Tomas-Buliart J, Soriano M (2011) An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking. Wirel Commun Mob Com 11:1446–1462.  https://doi.org/10.1002/Wcm.941 CrossRefGoogle Scholar
  11. Farashahi RR, Fouque P-A, Shparlinski I, Tibouchi M, Voloch J (2013) Indifferentiable deterministic hashing to elliptic and hyperelliptic curves. Math Comput 82:491–512MathSciNetCrossRefMATHGoogle Scholar
  12. Freeman DM, Satoh T (2011) Constructing pairing-friendly hyperelliptic curves using Weil restriction. J Number Theory 131:959–983.  https://doi.org/10.1016/j.jnt.2010.06.003 MathSciNetCrossRefMATHGoogle Scholar
  13. Gopal PVSSN, Vasudeva Reddy P, Gowri T (2013) New identity based signature scheme using bilinear pairings over elliptic curves. In: 2013 IEEE 3rd International paper presented at the advance computing conference (IACC), 22–23 Feb 2013Google Scholar
  14. Han S, Chang E, Dillon T (2005) Secure e-transactions using mobile agents with agent broker. In: Proceedings of paper presented at the 2005 international conference on services systems and services management, vol 1–2Google Scholar
  15. Icart T (2009) How to hash into elliptic curves. In: Paper presented at the advances in cryptology-CRYPTO 2009Google Scholar
  16. Jansen WA (2000) Countermeasures for mobile agent security. Comput Commun 23:1667–1676.  https://doi.org/10.1016/S0140-3664(00)00253-X CrossRefGoogle Scholar
  17. Kawahara Y, Kobayashi T, Takahashi G, Takagi T (2011) Faster maptopoint on supersingular elliptic curves in characteristic 3. IEICE Trans Fundam Electron Commun Comput Sci 94:150–155CrossRefGoogle Scholar
  18. Kotzanikolaou P, Burmester M, Chrissikopoulos V (2000) Secure Transactions with Mobile Agents in Hostile Environments. In: Paper presented at the information security and privacy, 1 Jan 2000Google Scholar
  19. Lauter K, Shang N (2013) Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields. Des Codes Cryptogr 67:341–355.  https://doi.org/10.1007/s10623-012-9611-8 MathSciNetCrossRefMATHGoogle Scholar
  20. Lee B, Kim H, Kim K (2001) Secure mobile agent using strong non-designated proxy signature. In: Proceedings of paper presented at the information security and privacyGoogle Scholar
  21. Object Management Group (OMG) (1997) Mobile agent system interoperability facilities specification. http://www.omg.org
  22. Pointcheval D, Stern J (1996) Security proofs for signature schemes. Adv Cryptol Eurocrypt ’96 1070:387–398MathSciNetCrossRefMATHGoogle Scholar
  23. Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13:361–396.  https://doi.org/10.1007/s001450010003 CrossRefMATHGoogle Scholar
  24. Sander T, Tschudin C (1998) Protecting mobile agents against malicious hosts. In: Paper presented at the mobile agents and security, 1 Jan 1998Google Scholar
  25. Shamir A (1985) Identity-based cryptosystems and signature schemes. In: Paper presented at the advances in cryptologyGoogle Scholar
  26. Shi Y, Cao L, Wang X (2004a) A security scheme of electronic commerce for mobile agents uses undetachable digital signatures. In: Paper presented at the Proceedings of the 3rd international conference on information security, 2004Google Scholar
  27. Shi Y, Lin J, Zhang C (2011) A white-box encryption algorithm for computing with mobile agents. J Internet Technol 12:981–993Google Scholar
  28. Shi Y, Wang XP, Cao LM, Ren JX (2004b) Secure mobile agents in electronic commerce by using undetachable signatures from pairings. In: Proceedings of 2004 paper presented at the shaping business strategy in a networked world, vol 1–2Google Scholar
  29. Shi Y, Xiong GY (2013) An undetachable threshold digital signature scheme based on conic curves. Appl Math Inform Sci 7:823–828MathSciNetCrossRefGoogle Scholar
  30. Shi Y, Zhao Q, Liu Q (2015) Secure mobile agents in ecommerce with forward-secure undetachable digital signatures. ETRI J 37:573–583.  https://doi.org/10.4218/etrij.15.0114.0657 CrossRefGoogle Scholar
  31. Singh R, Dave M (2013) Antecedence graph approach to checkpointing for fault tolerance in mobile agent systems. IEEE Trans Comput 62:247–258.  https://doi.org/10.1109/Tc.2011.235
  32. Steinwandt R, Corona AS (2012) Identity-based non-interactive key distribution with forward security. Des Code Cryptogr 64:195–208.  https://doi.org/10.1007/s10623-011-9486-0 MathSciNetCrossRefMATHGoogle Scholar
  33. TaeChan K, Sungwook K, Jung Hee C (2013) On the final exponentiation in tate pairing computations information theory. IEEE Trans Inform Theory 59:4033–4041.  https://doi.org/10.1109/TIT.2013.2240763 MathSciNetCrossRefMATHGoogle Scholar
  34. Tariq MA, Koldehofe B, Rothermel K (2014) Securing broker-less publish/subscribe systems using identity-based encryption. IEEE Trans Parall Distrib 25:518–528.  https://doi.org/10.1109/Tpds.2013.256 CrossRefGoogle Scholar
  35. Trappey AJC, Trappey CV, Lin FTL (2006) Automated silicon intellectual property trade using mobile agent technology. Robot Comput Integr Manuf 22:189–202.  https://doi.org/10.1016/j.rcim.2005.03.003 CrossRefGoogle Scholar
  36. Wang G, Wong TN, Wang XH (2014) A hybrid multi-agent negotiation protocol supporting agent mobility in virtual enterprises. Inform Sci 282:1–14.  https://doi.org/10.1016/j.ins.2014.06.021 CrossRefGoogle Scholar
  37. Wong TN, Fang F (2010) A multi-agent protocol for multilateral negotiations in supply chain management. Int J Prod Res 48:271–299.  https://doi.org/10.1080/00207540802425393 CrossRefMATHGoogle Scholar
  38. Wyseur B (2009) White-box cryptography. PhD Dissertation, Katholieke Universiteit Leuven, B. Preneel (promotor)Google Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  • Yang Shi
    • 1
  • Jingxuan Han
    • 1
  • Jiangfeng Li
    • 1
  • Guoyue Xiong
    • 1
  • Qinpei Zhao
    • 1
  1. 1.Tongji UniversityShanghaiPeople’s Republic of China

Personalised recommendations