Secure mobile agent using strong non-designated proxy signature

Cited 134 time in webofscience Cited 0 time in scopus
  • Hit : 416
  • Download : 39
DC FieldValueLanguage
dc.contributor.authorLee, Byoungcheonko
dc.contributor.authorKim, Heesunko
dc.contributor.authorKim, Kwangjoko
dc.date.accessioned2011-03-23T07:30:57Z-
dc.date.available2011-03-23T07:30:57Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2001-07-
dc.identifier.citationINFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2119, pp.474 - 486-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10203/22946-
dc.description.abstractIt is expected that mobile agent will be widely used for electronic commerce as an important key technology. If a mobile agent can sign a message in a remote server on behalf of a customer without exposing his/her private key, it can be used not only to search for special products or services, but also to make a contract with a remote server. To construct mobile agents, [KBC00] used an RSA-based undetachable signature scheme, but it does not provide server's non-repudiation because the undetachable signature does not contain server's signature. Mobile agent is a very good application example of proxy signature, and the undetachable signature can be considered as an example of proxy signature. In this paper we show that secure mobile agent can be constructed using strong non-designated proxy signature [LKK01] which represents both the original signer's (customer) and the proxy signer's (remote server) signatures. We provide RSA-bascd and Schnorr-based constructions of secure mobile agent, and moreover we show that the Schnorr-based scheme can be used very efficiently in multi-proxy mobile agent situation.-
dc.description.sponsorshipThis work was done when she was with ICU.en
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherSPRINGER-VERLAG BERLIN-
dc.titleSecure mobile agent using strong non-designated proxy signature-
dc.typeArticle-
dc.identifier.wosid000174747100037-
dc.type.rimsART-
dc.citation.volume2119-
dc.citation.beginningpage474-
dc.citation.endingpage486-
dc.citation.publicationnameINFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorLee, Byoungcheon-
dc.contributor.nonIdAuthorKim, Heesun-
dc.type.journalArticleArticle; Proceedings Paper-
dc.subject.keywordAuthorsecure mobile agent-
dc.subject.keywordAuthorstrong non-designated proxy signature-
dc.subject.keywordAuthormulti-proxy signature-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 134 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0