Abstract
While software agents have been employed in payment protocols, they are largely passive entities, i.e., they participate in the payment protocol but do not make decision. In this paper, we propose an agent-assisted payment protocol called LITESET/A+ that empowers the payment agent (PA) to perform encryption operation for its owner. This is realized by introducing a Trusted Third Party (TTP) in the payment system based on the SET protocol (Secure Electronic Transaction) and a novel signcryption-threshold scheme. In LITESET/A+, the PA and TTP collaborate together to ensure the same level of security as the SET specification. At the same time, with the signcryption-threshold scheme, the PA is more flexible and autonomous during trading.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
VISA INTERNATIONAL, and MASTERCARD INTERNATIONAL. Secure Electronic Transaction (SET) Specification. Version 1.0, (1997)
Romao, A., M. M. da. Sliva: “An agent-based secure Internet payment system for mobile computing”, TREC’98, LNCS 1402, (1998) 80–93
Yi, X., Siew, C. K., Wang, X. F., Okamoto, E.: “A secure Agent-based Framework for the Internet Trading in Mobile Computing Environments”, in Distributed and Parallel Databases, 8. (2000) 85–117
Hanaoka, G., Zheng, Y., Imai, H.: “LITESET: a light-weight secure electronic transaction protocol”, Proc. ACISP’98, Lecture Notes in Computer Science, vol. 1438. Springer-Verlag. (1998) 215–226
Rivest, R. L., Shamir, A., Adleman, L.: “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, 21. (1978) 120–126
Kotzanikolaou, P., Burmester, M., Chrissikopoulos, V.: “Secure Transactions with Mobile Agents in Hostile Environments”, ACISP 2000, LNCS 1841. (2000) 289–297
Romao, A., Sliva, M. M. da.: “Secure mobile agent digital signatures with proxy certificates”, E-Commerce Agents, LNAI 2033. (2001) 206–220
Stinson, D. R.: “Secret Sharing Schemes”, Cryptography-Theory and Practice, CRC Press. (1995) 326–331
Menezes, A., Van Oorschot, P., Vanstone, S.: “Threshold Schemes”, Handbook of Applied Cryptography, CRC Press. (1996)
Zheng, Y.: “Signcryption and Its Applications in Efficient Public Key Solutions”, Information Security Workshop (ISW’ 97), Springer-Verlag, LNCS 1397. (1998) 291–312
Zheng, Y.: “Digital Signcryption or How to Achieve Cost (Signature& Encryption)<<Cost (Signature)+Cost (Encryption), in Advances in Cryptology-CRYPO’97, vol 1294. Springer-Verlag. (1997) 165–179
Mambo, M., Usuda, K., Okamoto, E.: “Proxy Signatures for Delegating Signing operation”, Proc.Third ACM Conf. On Computer and Communications Security. (1996) 48–57
Kim, S., Park, S., Won, D.: “Proxy signatures, Revisited”, Proc. Of ICICS’97, International Conference on Information and Communications Security, LNCS1334, Springer-Verlag. (1997) 223–232
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pang, X., Tan, KL., Wang, Y., Ren, J. (2002). A Secure Agent-Mediated Payment Protocol. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_36
Download citation
DOI: https://doi.org/10.1007/3-540-36159-6_36
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00164-5
Online ISBN: 978-3-540-36159-6
eBook Packages: Springer Book Archive