Using “Fair Forfeit” to Prevent Truncation Attacks on Mobile Agents

  • Min Yao
  • Kun Peng
  • Ed Dawson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3574)


Protection of data integrity in mobile agents has drawn much attention in recent years. Various degrees of agent data integrity have been achieved by a number of proposed schemes. A known vulnerability of these published techniques is the truncation attack. In this paper we propose a “fair forfeit” technique to prevent the truncation attack. It also prevents other known attacks such as the modification, insertion and deletion attacks.


Mobile Agent Payment Instrument Truncation Attack Malicious Server Electronic Cash 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Brands, S.: Untraceable off-line cash in wallet with observers. In: Proceedings of the 13th annual international cryptology conference on Advances in cryptology. LNCS, pp. 302–318. Springer, Heidelberg (1994)Google Scholar
  2. 2.
    Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Proceedings on Advances in cryptology. LNCS, pp. 319–327. Springer, Heidelberg (1990)Google Scholar
  3. 3.
    Cheng, J.S.L., Wei, V.K.: Defenses against the Truncation of Computation Results of Free-Roaming Agents. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 1–12. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Ferguson, N.: Single term off-line coins. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 318–328. Springer, Heidelberg (1994)Google Scholar
  5. 5.
    Karjoth, G., Asokan, N., Gülcü, C.: Protecting the Computation Results of Free- Roaming Agents. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 195–207. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  6. 6.
    Loureiro, S., Molva, R., Pannetrat, A.: Secure Data Collection with Updates. Electronic Commerce Research Journal, 1/2, 119–130 (2001)Google Scholar
  7. 7.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press Inc., Boca Raton (1996)CrossRefGoogle Scholar
  8. 8.
    Mu, Y., Varadharajan, V., Nguyen, K.Q.: Digital cash. Payment technologies for E-commerce, pp. 171–194. Springer, Heidelberg (2003)Google Scholar
  9. 9.
    Piccinelli, G., Stefanelli, C., Trastour, D.: Trusted Mediation for E-service Provision in Electronic Marketplaces. In: Fiege, L., Mühl, G., Wilhelm, U.G. (eds.) WELCOM 2001. LNCS, vol. 2232, pp. 39–50. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  10. 10.
    Schoenmakers, L.A.M.: An efficient electronic payment system withstanding parallel attacks. Technical Report CS-R9522, CWI (1995)Google Scholar
  11. 11.
    Yao, M., Foo, E., Peng, K., Dawson, E.: An Improved Forward Integrity Protocol for Mobile Agents. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol. 2908, pp. 272–285. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Min Yao
    • 1
  • Kun Peng
    • 1
  • Ed Dawson
    • 1
  1. 1.Information Security InstituteQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations