Skip to main content

A Secure Agent-Mediated Payment Protocol

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2513))

Included in the following conference series:

Abstract

While software agents have been employed in payment protocols, they are largely passive entities, i.e., they participate in the payment protocol but do not make decision. In this paper, we propose an agent-assisted payment protocol called LITESET/A+ that empowers the payment agent (PA) to perform encryption operation for its owner. This is realized by introducing a Trusted Third Party (TTP) in the payment system based on the SET protocol (Secure Electronic Transaction) and a novel signcryption-threshold scheme. In LITESET/A+, the PA and TTP collaborate together to ensure the same level of security as the SET specification. At the same time, with the signcryption-threshold scheme, the PA is more flexible and autonomous during trading.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. URL: http://www.netscape.com/eng/ssl3/ssl-toc.html

  2. URL: http://www.terisa.com/shttp/current.txt

  3. VISA INTERNATIONAL, and MASTERCARD INTERNATIONAL. Secure Electronic Transaction (SET) Specification. Version 1.0, (1997)

    Google Scholar 

  4. Romao, A., M. M. da. Sliva: “An agent-based secure Internet payment system for mobile computing”, TREC’98, LNCS 1402, (1998) 80–93

    Google Scholar 

  5. Yi, X., Siew, C. K., Wang, X. F., Okamoto, E.: “A secure Agent-based Framework for the Internet Trading in Mobile Computing Environments”, in Distributed and Parallel Databases, 8. (2000) 85–117

    Article  Google Scholar 

  6. Hanaoka, G., Zheng, Y., Imai, H.: “LITESET: a light-weight secure electronic transaction protocol”, Proc. ACISP’98, Lecture Notes in Computer Science, vol. 1438. Springer-Verlag. (1998) 215–226

    Google Scholar 

  7. Rivest, R. L., Shamir, A., Adleman, L.: “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, 21. (1978) 120–126

    Article  MATH  MathSciNet  Google Scholar 

  8. Kotzanikolaou, P., Burmester, M., Chrissikopoulos, V.: “Secure Transactions with Mobile Agents in Hostile Environments”, ACISP 2000, LNCS 1841. (2000) 289–297

    Google Scholar 

  9. Romao, A., Sliva, M. M. da.: “Secure mobile agent digital signatures with proxy certificates”, E-Commerce Agents, LNAI 2033. (2001) 206–220

    Google Scholar 

  10. Stinson, D. R.: “Secret Sharing Schemes”, Cryptography-Theory and Practice, CRC Press. (1995) 326–331

    Google Scholar 

  11. Menezes, A., Van Oorschot, P., Vanstone, S.: “Threshold Schemes”, Handbook of Applied Cryptography, CRC Press. (1996)

    Google Scholar 

  12. Zheng, Y.: “Signcryption and Its Applications in Efficient Public Key Solutions”, Information Security Workshop (ISW’ 97), Springer-Verlag, LNCS 1397. (1998) 291–312

    Google Scholar 

  13. Zheng, Y.: “Digital Signcryption or How to Achieve Cost (Signature& Encryption)<<Cost (Signature)+Cost (Encryption), in Advances in Cryptology-CRYPO’97, vol 1294. Springer-Verlag. (1997) 165–179

    Article  Google Scholar 

  14. Mambo, M., Usuda, K., Okamoto, E.: “Proxy Signatures for Delegating Signing operation”, Proc.Third ACM Conf. On Computer and Communications Security. (1996) 48–57

    Google Scholar 

  15. Kim, S., Park, S., Won, D.: “Proxy signatures, Revisited”, Proc. Of ICICS’97, International Conference on Information and Communications Security, LNCS1334, Springer-Verlag. (1997) 223–232

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pang, X., Tan, KL., Wang, Y., Ren, J. (2002). A Secure Agent-Mediated Payment Protocol. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_36

Download citation

  • DOI: https://doi.org/10.1007/3-540-36159-6_36

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00164-5

  • Online ISBN: 978-3-540-36159-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics