Secure Mobile Agent from Leakage-Resilient Proxy Signatures

A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an im...

Full description

Bibliographic Details
Main Authors: Fei Tang, Hongda Li, Qihua Niu, Bei Liang
Format: Article
Language:English
Published: Hindawi Limited 2015-01-01
Series:Mobile Information Systems
Online Access:http://dx.doi.org/10.1155/2015/901418
id doaj-01a666d7b96b4cd981ee5b5070e2897a
record_format Article
spelling doaj-01a666d7b96b4cd981ee5b5070e2897a2021-07-02T02:36:07ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2015-01-01201510.1155/2015/901418901418Secure Mobile Agent from Leakage-Resilient Proxy SignaturesFei Tang0Hongda Li1Qihua Niu2Bei Liang3The Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, No. 89 Minzhuang Road, Haidian District, Beijing 100093, ChinaThe Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, No. 89 Minzhuang Road, Haidian District, Beijing 100093, ChinaThe Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, No. 89 Minzhuang Road, Haidian District, Beijing 100093, ChinaThe Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, No. 89 Minzhuang Road, Haidian District, Beijing 100093, ChinaA mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator) to delegate its signing right to another entity (proxy) to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.http://dx.doi.org/10.1155/2015/901418
collection DOAJ
language English
format Article
sources DOAJ
author Fei Tang
Hongda Li
Qihua Niu
Bei Liang
spellingShingle Fei Tang
Hongda Li
Qihua Niu
Bei Liang
Secure Mobile Agent from Leakage-Resilient Proxy Signatures
Mobile Information Systems
author_facet Fei Tang
Hongda Li
Qihua Niu
Bei Liang
author_sort Fei Tang
title Secure Mobile Agent from Leakage-Resilient Proxy Signatures
title_short Secure Mobile Agent from Leakage-Resilient Proxy Signatures
title_full Secure Mobile Agent from Leakage-Resilient Proxy Signatures
title_fullStr Secure Mobile Agent from Leakage-Resilient Proxy Signatures
title_full_unstemmed Secure Mobile Agent from Leakage-Resilient Proxy Signatures
title_sort secure mobile agent from leakage-resilient proxy signatures
publisher Hindawi Limited
series Mobile Information Systems
issn 1574-017X
1875-905X
publishDate 2015-01-01
description A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator) to delegate its signing right to another entity (proxy) to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.
url http://dx.doi.org/10.1155/2015/901418
work_keys_str_mv AT feitang securemobileagentfromleakageresilientproxysignatures
AT hongdali securemobileagentfromleakageresilientproxysignatures
AT qihuaniu securemobileagentfromleakageresilientproxysignatures
AT beiliang securemobileagentfromleakageresilientproxysignatures
_version_ 1721342980437049344