Using “Fair Forfeit” to Prevent Truncation Attacks on Mobile Agents
Protection of data integrity in mobile agents has drawn much attention in recent years. Various degrees of agent data integrity have been achieved by a number of proposed schemes. A known vulnerability of these published techniques is the truncation attack. In this paper we propose a “fair forfeit” technique to prevent the truncation attack. It also prevents other known attacks such as the modification, insertion and deletion attacks.
KeywordsMobile Agent Payment Instrument Truncation Attack Malicious Server Electronic Cash
Unable to display preview. Download preview PDF.
- 1.Brands, S.: Untraceable off-line cash in wallet with observers. In: Proceedings of the 13th annual international cryptology conference on Advances in cryptology. LNCS, pp. 302–318. Springer, Heidelberg (1994)Google Scholar
- 2.Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Proceedings on Advances in cryptology. LNCS, pp. 319–327. Springer, Heidelberg (1990)Google Scholar
- 4.Ferguson, N.: Single term off-line coins. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 318–328. Springer, Heidelberg (1994)Google Scholar
- 6.Loureiro, S., Molva, R., Pannetrat, A.: Secure Data Collection with Updates. Electronic Commerce Research Journal, 1/2, 119–130 (2001)Google Scholar
- 8.Mu, Y., Varadharajan, V., Nguyen, K.Q.: Digital cash. Payment technologies for E-commerce, pp. 171–194. Springer, Heidelberg (2003)Google Scholar
- 10.Schoenmakers, L.A.M.: An efficient electronic payment system withstanding parallel attacks. Technical Report CS-R9522, CWI (1995)Google Scholar