skip to main content
10.1145/2389376.2389396acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicecConference Proceedingsconference-collections
research-article

A survey on mobile digital signature models

Published:02 August 2010Publication History

ABSTRACT

The application of a fast and secure mobile signature model is an essential issue for the development of the mobile electronic commerce, since digital signatures can provide authentication, non-repudiation, and data integrity. There are several technologies and models with the aim of implementing signature processes for mobile devices. In this paper, we categorize them into client based and server based models. We will comment on the most important properties of each solution and analyze the advantages and disadvantages, with a special focus on the private key security, performance of the signature generation process, and application of digital certificates.

References

  1. D. Li, D. Lin, G. Zhao, and B. Huang, "Design and correctness proof of a security protocol for mobile banking", Bell Labs Technical Journal, vol. 14(1), 2009, pp. 259--266, Alcatel-Lucent, Wiley Periodicals, doi: 10.1002/bltj.20366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Ruiz-Martinez, D. Sanchez-Martinez, M. Martinez-Montesinos, A. F. Gomez-Skameta, "A survey of electronic signature solutions in mobile devices", Theoretical and applied electronic commerce research, vol. 2, issue 3,December 2007, pp. 94--109. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. H. Rossnagel, "Mobile qualified electronic signatures and certification on demand", in: Proc. of the 1st European PKI Workshop, Samos, Greece, June 2004.Google ScholarGoogle ScholarCross RefCross Ref
  4. O'Mahony, Donal; Peirce, Michael; Tewary, Hitesh, "Electronic payment systems for e-commerce", Artech House, 2001, chapter 8, pp. 302--325.Google ScholarGoogle Scholar
  5. C.L. Chen, C. C. Chen, L. C. Liu, G. Horng, "A server-aided signature scheme for mobile commerce", IWCMC07, ACM, Aug. 2007, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Z. Wang, Z. Guo, Y. Wang, "Security research on J2ME-based mobile payment", ISECS Int. Colloquium on Computing, Communication, Control, and Management (CCCM08), IEEE, 2008, pp. 644--648, doi: 10.1109/CCCM.2008.216. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Claessens, B. Preneel, J. Vandewalle, "(How) Can mobile agents do secure electronic transactions on untrusted hosts?", ACM Trans. On Internet Technology, vol. 3, No. 1, Feb. 2003, pp. 28--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C.M. Ou, C. R. Ou, "Adaptation of proxy certificates to non-repudiation protocol of agent-based mobile payment systems", Applied Intelligence, v.30 n.3, p.233--243, June 2009, doi: 10.1007/s10489-007-0089-4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Romao, M. Mira da Silva, "Secure mobile agent digital signatures with proxy certificates", E-commerce Agents, LNAI 2033, Springer, 2001, pp. 206--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. O. Bamasak, N. Zahng, "A secure method for signature delegation to mobile agents", ACM Symposium on Applied Computing (SAC04), ACM, Mar. 2004, pp. 813--818. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. K. Bicakci and N. Baykal. "SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing", LNCS No. 2802, Germany, 2003.Google ScholarGoogle Scholar
  12. K. Bicakci and N. Baykal. "Improved Server Assisted Signatures", Journal of Computer Networks, Elsevier, 2005, vol. 47, No. 3 pp. 351--366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. He, and N. Zhang, "A New Signature Scheme: Joint Signature", Proceedings of the 2004 ACM symposium on Applied computing, Cyprus, 2004, pp. 807--828. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. He, N. Zhang, L. He, I. Rogers, "Secure m-commerce transactions: a third party based signature protocol", third int. Symposium on Information Assurance and Security, IEEE, 2007, doi: 10.1109/IAS.2007.66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Y. Lei, D. Chen, Z. Jiang, "Generating digital signatures on mobile devices", Proc. 18th International Conference on Advanced Information Networking and Application (AINA04), IEEE, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. X. Ding, D. Mazzocchi, G. Tsudik, "Equipping smart devices with public key signatures", ACM trans. On Internet Technology, vol. 7, No. 1, Article 3, Feb. 2007, doi: 10.1145/1189740.1189743. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S.T. Chanson, T. W. Cheung, "Design and implementation of a PKI-based end-to-end secure infrastructure for mobile e-commerce", World Wide Web, vol. 4, 2001, pp. 235--253, Kluwer Academic Publishers. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. SATSA Development Guide, available at: http://java.sun.com/j2me/docs/satsa-dg.Google ScholarGoogle Scholar
  19. BouncyCastle Library, http://www.bouncycastle.orgGoogle ScholarGoogle Scholar
  20. IAIK Library, http://jce.iaik.tugraz.atGoogle ScholarGoogle Scholar
  21. A. Ruiz-Martínez, Daniel Sánchez-Martínez, María Martínez-Montensiones, A. F. Gómez-Skarmeta. "Mobile Signature Solutions for Guaranteeing Non-Repudiation in Mobile Business and Mobile Commerce". Mobile and Ubiquitous Commerce: Advanced E-Business Methods: Volume 4 of Advances in Electronic Business Series. IGI Global Publishers. May 2009.Google ScholarGoogle Scholar
  22. M. H. Samadani, M. Shajari, M. M. Ahaniha, "self-proxy mobile signature, a new client-based mobile signature model", WAMIS'10, in Proceeding of the 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Perth, Australia, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A survey on mobile digital signature models

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                ICEC '10: Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business
                August 2010
                215 pages
                ISBN:9781450314275
                DOI:10.1145/2389376

                Copyright © 2010 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 2 August 2010

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                Overall Acceptance Rate150of244submissions,61%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader