skip to main content
article
Free Access

An anonymous electronic commerce scheme with an off-line authority and untrusted agents

Authors Info & Claims
Published:01 December 1998Publication History
Skip Abstract Section

Abstract

In the last years, the exponential growth of computer networks has created an incredibly large offer of products and services in the net. Such a huge amount of information makes it impossible for a single person to analyze all existing offers of a product on the net and decide which of them fits better her requirements. This problem is solved with the intelligent trade agents (ITA), which are programs that have the ability to roam a network, collect business-related data and use them to make decisions to buy goods on their owners' behalf. Known ITA systems do not provide anonymity in transactions, require an on-line trusted third party and implicitly assume that the user trusts the ITA. We present a new scheme for an intelligent untrusted trade agent system allowing anonymous electronic transactions with an off-line trusted third party.

References

  1. {1} S. Y. Bennet, "A sanctuary for mobile agents". DARPA Workshop on Fundations for Secure Mobile Code Workshop, Mar. 1997, Monterrey, California, U.S.A.Google ScholarGoogle Scholar
  2. {2} R. Berger, R. Peralta and T. Tedrick, "A provably secure oblivious transfer protocol". Advances in Cryptology-EUROCRYPT'84, LNCS 209. Springer-Verlag, 1985, pp. 408-416. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. {3} B. N. Bershad, S. Savage, P. Pardyak, E. G. Sirer, M. E. Fiuczynski, D. Becker, C. Chambers and S. Eggers, "Extensibility safety and performance in the spin operating system". In Proceedings of the Fifteenth Symposium on Operating System Principles, Dec. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. {4} S. Brands, "Untraceable off-line cash in wallets with observers". Advances in Cryptology-CRYPTO'93, LNCS 773. Springer-Verlag, 1993, pp. 302-318. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. {5} D. Chaum, "Blind signatures for untraceable payments". Advances in Cryptology-CRYPTO'82, Plenum Press, 1983, pp. 199-203.Google ScholarGoogle ScholarCross RefCross Ref
  6. {6} D. Chaum, "Security without identification: Transaction systems to make big brother obsolete". Communications of the ACM, vol. 28 no. 5, Oct. 1985, pp. 1030-1044. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. {7} S. Even, O. Golderich and A. Lempel, "A randomizing protocol for signing contracts". Communications of the ACM, vol. 28, no. 6, Jun. 1985, pp. 637-647. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. {8} W. C. Hsieh, M. E. Fiuczynski, C. Garrett, S. Savage, D. Becker and B. N. Bershad, "Language support for extensible operating systems". In Proceedings of the Workshop on Compiler Support for System Software, Feb. 1996.Google ScholarGoogle Scholar
  9. {9} F. Hohl, "An approach to solve the problem of malicious hosts". Technical Report Number TR- 1997-03, Fakultät Informatik, Universität Stuttgart, Mar. 1997.Google ScholarGoogle Scholar
  10. {10} J. Merwe and S.H. von Solms, "Electronic commerce with secure intelligent trade agents". Information and Communications Security, LNCS 1334. Springer-Verlag, 1997, pp. 452-462. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. {11} G. Necula and P. Lee, "Safe kernel extensions without run-time checks". In Proceedings of the Second Sumposium on Operating Systems Design and Implementation, Oct. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. {12} T. Sander and C.F. Tschudin, "Protecting mobile agent against malicious hosts". Mobile Agents and Security, LNCS 1419. Springer-Verlag, 1998, pp. 44- 60.Google ScholarGoogle Scholar
  13. {13} T. Tedrick, "Fair exchange of secrets". Advances in Cryptology-CRYPTO'84, LNCS 196. Springer-Verlag, 1985, pp. 434-438. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An anonymous electronic commerce scheme with an off-line authority and untrusted agents

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Article Metrics

          • Downloads (Last 12 months)8
          • Downloads (Last 6 weeks)2

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader