Secure Mobile Agent from Leakage-Resilient Proxy Signatures
A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an im...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2015-01-01
|
Series: | Mobile Information Systems |
Online Access: | http://dx.doi.org/10.1155/2015/901418 |
id |
doaj-01a666d7b96b4cd981ee5b5070e2897a |
---|---|
record_format |
Article |
spelling |
doaj-01a666d7b96b4cd981ee5b5070e2897a2021-07-02T02:36:07ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2015-01-01201510.1155/2015/901418901418Secure Mobile Agent from Leakage-Resilient Proxy SignaturesFei Tang0Hongda Li1Qihua Niu2Bei Liang3The Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, No. 89 Minzhuang Road, Haidian District, Beijing 100093, ChinaThe Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, No. 89 Minzhuang Road, Haidian District, Beijing 100093, ChinaThe Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, No. 89 Minzhuang Road, Haidian District, Beijing 100093, ChinaThe Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, No. 89 Minzhuang Road, Haidian District, Beijing 100093, ChinaA mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator) to delegate its signing right to another entity (proxy) to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.http://dx.doi.org/10.1155/2015/901418 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Fei Tang Hongda Li Qihua Niu Bei Liang |
spellingShingle |
Fei Tang Hongda Li Qihua Niu Bei Liang Secure Mobile Agent from Leakage-Resilient Proxy Signatures Mobile Information Systems |
author_facet |
Fei Tang Hongda Li Qihua Niu Bei Liang |
author_sort |
Fei Tang |
title |
Secure Mobile Agent from Leakage-Resilient Proxy Signatures |
title_short |
Secure Mobile Agent from Leakage-Resilient Proxy Signatures |
title_full |
Secure Mobile Agent from Leakage-Resilient Proxy Signatures |
title_fullStr |
Secure Mobile Agent from Leakage-Resilient Proxy Signatures |
title_full_unstemmed |
Secure Mobile Agent from Leakage-Resilient Proxy Signatures |
title_sort |
secure mobile agent from leakage-resilient proxy signatures |
publisher |
Hindawi Limited |
series |
Mobile Information Systems |
issn |
1574-017X 1875-905X |
publishDate |
2015-01-01 |
description |
A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator) to delegate its signing right to another entity (proxy) to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems. |
url |
http://dx.doi.org/10.1155/2015/901418 |
work_keys_str_mv |
AT feitang securemobileagentfromleakageresilientproxysignatures AT hongdali securemobileagentfromleakageresilientproxysignatures AT qihuaniu securemobileagentfromleakageresilientproxysignatures AT beiliang securemobileagentfromleakageresilientproxysignatures |
_version_ |
1721342980437049344 |