Advertisement

Toward a Security EC Transaction on Web

  • Whe Dar Lin
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2738)

Abstract

In this article, we present the way toward a security EC transaction on Web. The Internet and electronic commerce offer endless possibilities and opportunities to business of all sizes as well as convenience to consumers. These benefits are not reaped without danger for merchants and consumers. When a purchase list or an invoice is created it may get infected with some modification by intruder before the signature is attached to it. We proposed a signature scheme that let one can sign right in atomic step after creation for a security EC transaction on Web protocol. We have seen how electronic commerce accommodates the increasing consumer appetite for online shopping and Internet trade using the EC-Web server as the enabler. The data with some modification by intruder can be detected by EC-Web server or mobile agent. Besides that, we also proposed the message recovery capability to recover the original purchase list to save the infected files. The most natural extension of our protocol scheme that the mobile agent with anonymous property for mobile agent. The mobile agent use random id to purchase on EC Web. The EC-Web server can check random id is legal group member or not, with EC application packages will allow mobile agent and EC-Web server to commit themselves to one another. Security is the critical backdrop that must be in the place for our EC transaction on Web protocol.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ginige, A., Murugesan, S.: Web Engineering: An Introduction. J. of IEEE MultiMedia, 14–18 (January 2001)Google Scholar
  2. 2.
    Young, A., Yung, M.: Auto-Recoverable Auto-Certifiable Cryptosystems. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 17–31. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  3. 3.
    Schoenmakers, B.: A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 148–164. Springer, Heidelberg (1999)Google Scholar
  4. 4.
    Manchala, D.W.: E-Commerce Trust Metrics and Models. J. of IEEE Internet Computing, 36–44 (March 2000)Google Scholar
  5. 5.
    Lim, J.B., Hurson, A.R.: Transaction order processing in Mobile, Heterogeneous Database Systems. IEEE Trans. On Knowledge and data Engineering 14(6), 1330–1346 (2002)CrossRefGoogle Scholar
  6. 6.
    Nyberg, K., Rueppel, R.A.: Message recovery for signature scheme based on the discrete logarithm problem. Designs, Codes and Cryptography (7), 61–81 (1996)zbMATHGoogle Scholar
  7. 7.
    Usuda, K., Mambo, M., Uyematsu, T., Okamoto, E.: Proposal of an automatic signature scheme using a Web-based platform. IEICE Trans. Fundamentals E79-A (1), 94–101 (1996)Google Scholar
  8. 8.
    Sherwood, R., Bhattacharjee, B., Srinivasan, A.: A Protocol for Scalable Anonymous Communication. In: Proc. the IEEE Symposium on Security and Privacy, pp. 1–12 (2002)Google Scholar
  9. 9.
    Maurer, U.: Information-Theoretic Cryptography. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 47–65. Springer, Heidelberg (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Whe Dar Lin
    • 1
  1. 1.The Overseas Chinese Institute of TechnologyDept of Information ManagementTaichungTaiwan

Personalised recommendations