About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
3rd International ICST Symposium on Information Assurance and Security

Research Article

Secure M-commerce Transactions: A Third Party Based Signature Protocol

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/IAS.2007.66,
        author={ Lisha  He and Ning  Zhang and Lirong  He and Ian Rogers},
        title={Secure M-commerce Transactions: A Third Party Based Signature Protocol},
        proceedings={3rd International ICST Symposium on  Information Assurance and Security},
        publisher={IEEE},
        proceedings_a={IAS},
        year={2007},
        month={9},
        keywords={cryptographic protocols.  digital signatures  m-commerce security  signature delegation},
        doi={10.1109/IAS.2007.66}
    }
    
  • Lisha He
    Ning Zhang
    Lirong He
    Ian Rogers
    Year: 2007
    Secure M-commerce Transactions: A Third Party Based Signature Protocol
    IAS
    IEEE
    DOI: 10.1109/IAS.2007.66
Lisha He1, Ning Zhang1,*, Lirong He2, Ian Rogers2,*
  • 1: School of Computer Science, University of Manchester
  • 2: School of Computer Science, University of Mancheste
*Contact email: nzhang@cs.man.ac.uk, ian.rogers@manchester.ac.uk

Abstract

In this paper, we present a novel joint signature protocol suited to applications run on UMTS and heterogeneous networks. The protocol enables a mobile user to securely delegate his/her signing power to an assisted server so that the assisted server can perform signature generation and verification on behalf of the user. By shifting computational expensive cryptographic operations to a third party, i.e. the assisted server, the protocol is able to eliminate public key operations for the mobile end, while providing message origin authentication, integrity, and non-repudiation services to both delegated (i.e. the mobile user) and delegating (i.e. the third party) entities. The protocol is suited to m-commerce applications, in which a mobile user with a resource restrictive device wishes to access Internet-based security-sensitive services. The security of the proposed protocol is analyzed and its performance against other related work is evaluated.

Keywords
cryptographic protocols. digital signatures m-commerce security signature delegation
Published
2007-09-10
Publisher
IEEE
Modified
2011-08-01
http://dx.doi.org/10.1109/IAS.2007.66
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL