ABSTRACT
The application of a fast and secure mobile signature model is an essential issue for the development of the mobile electronic commerce, since digital signatures can provide authentication, non-repudiation, and data integrity. There are several technologies and models with the aim of implementing signature processes for mobile devices. In this paper, we categorize them into client based and server based models. We will comment on the most important properties of each solution and analyze the advantages and disadvantages, with a special focus on the private key security, performance of the signature generation process, and application of digital certificates.
- D. Li, D. Lin, G. Zhao, and B. Huang, "Design and correctness proof of a security protocol for mobile banking", Bell Labs Technical Journal, vol. 14(1), 2009, pp. 259--266, Alcatel-Lucent, Wiley Periodicals, doi: 10.1002/bltj.20366. Google ScholarDigital Library
- A. Ruiz-Martinez, D. Sanchez-Martinez, M. Martinez-Montesinos, A. F. Gomez-Skameta, "A survey of electronic signature solutions in mobile devices", Theoretical and applied electronic commerce research, vol. 2, issue 3,December 2007, pp. 94--109. Google ScholarDigital Library
- H. Rossnagel, "Mobile qualified electronic signatures and certification on demand", in: Proc. of the 1st European PKI Workshop, Samos, Greece, June 2004.Google ScholarCross Ref
- O'Mahony, Donal; Peirce, Michael; Tewary, Hitesh, "Electronic payment systems for e-commerce", Artech House, 2001, chapter 8, pp. 302--325.Google Scholar
- C.L. Chen, C. C. Chen, L. C. Liu, G. Horng, "A server-aided signature scheme for mobile commerce", IWCMC07, ACM, Aug. 2007, USA. Google ScholarDigital Library
- Z. Wang, Z. Guo, Y. Wang, "Security research on J2ME-based mobile payment", ISECS Int. Colloquium on Computing, Communication, Control, and Management (CCCM08), IEEE, 2008, pp. 644--648, doi: 10.1109/CCCM.2008.216. Google ScholarDigital Library
- J. Claessens, B. Preneel, J. Vandewalle, "(How) Can mobile agents do secure electronic transactions on untrusted hosts?", ACM Trans. On Internet Technology, vol. 3, No. 1, Feb. 2003, pp. 28--48. Google ScholarDigital Library
- C.M. Ou, C. R. Ou, "Adaptation of proxy certificates to non-repudiation protocol of agent-based mobile payment systems", Applied Intelligence, v.30 n.3, p.233--243, June 2009, doi: 10.1007/s10489-007-0089-4. Google ScholarDigital Library
- A. Romao, M. Mira da Silva, "Secure mobile agent digital signatures with proxy certificates", E-commerce Agents, LNAI 2033, Springer, 2001, pp. 206--220. Google ScholarDigital Library
- O. Bamasak, N. Zahng, "A secure method for signature delegation to mobile agents", ACM Symposium on Applied Computing (SAC04), ACM, Mar. 2004, pp. 813--818. Google ScholarDigital Library
- K. Bicakci and N. Baykal. "SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing", LNCS No. 2802, Germany, 2003.Google Scholar
- K. Bicakci and N. Baykal. "Improved Server Assisted Signatures", Journal of Computer Networks, Elsevier, 2005, vol. 47, No. 3 pp. 351--366. Google ScholarDigital Library
- L. He, and N. Zhang, "A New Signature Scheme: Joint Signature", Proceedings of the 2004 ACM symposium on Applied computing, Cyprus, 2004, pp. 807--828. Google ScholarDigital Library
- L. He, N. Zhang, L. He, I. Rogers, "Secure m-commerce transactions: a third party based signature protocol", third int. Symposium on Information Assurance and Security, IEEE, 2007, doi: 10.1109/IAS.2007.66. Google ScholarDigital Library
- Y. Lei, D. Chen, Z. Jiang, "Generating digital signatures on mobile devices", Proc. 18th International Conference on Advanced Information Networking and Application (AINA04), IEEE, 2004. Google ScholarDigital Library
- X. Ding, D. Mazzocchi, G. Tsudik, "Equipping smart devices with public key signatures", ACM trans. On Internet Technology, vol. 7, No. 1, Article 3, Feb. 2007, doi: 10.1145/1189740.1189743. Google ScholarDigital Library
- S.T. Chanson, T. W. Cheung, "Design and implementation of a PKI-based end-to-end secure infrastructure for mobile e-commerce", World Wide Web, vol. 4, 2001, pp. 235--253, Kluwer Academic Publishers. Google ScholarDigital Library
- SATSA Development Guide, available at: http://java.sun.com/j2me/docs/satsa-dg.Google Scholar
- BouncyCastle Library, http://www.bouncycastle.orgGoogle Scholar
- IAIK Library, http://jce.iaik.tugraz.atGoogle Scholar
- A. Ruiz-Martínez, Daniel Sánchez-Martínez, María Martínez-Montensiones, A. F. Gómez-Skarmeta. "Mobile Signature Solutions for Guaranteeing Non-Repudiation in Mobile Business and Mobile Commerce". Mobile and Ubiquitous Commerce: Advanced E-Business Methods: Volume 4 of Advances in Electronic Business Series. IGI Global Publishers. May 2009.Google Scholar
- M. H. Samadani, M. Shajari, M. M. Ahaniha, "self-proxy mobile signature, a new client-based mobile signature model", WAMIS'10, in Proceeding of the 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Perth, Australia, 2010. Google ScholarDigital Library
Index Terms
- A survey on mobile digital signature models
Recommendations
A survey of electronic signature solutions in mobile devices
The development of electronic signature in mobile devices is an essential issue for the advance and expansion of the mobile electronic commerce since it provides security and trust in the system. E-signatures provide security for the transactions with ...
A formal construction of certificateless proxy multi-signature scheme
Proxy multi-signature is a scheme that allows a proxy signer to sign messages on behalf of a group of original signers. To our best knowledge, most of the existing proxy multi-signature schemes are proposed in public key infrastructure or identity-based ...
An efficient user authentication and key exchange protocol for mobile client-server environment
Considering the low-power computing capability of mobile devices, the security scheme design is a nontrivial challenge. The identity (ID)-based public-key system with bilinear pairings defined on elliptic curves offers a flexible approach to achieve ...
Comments