{"title":"敌对环境下具有移动代理的乐观支付协议","authors":"Yi Liu, Yong Ding","doi":"10.1109/NCIS.2011.50","DOIUrl":null,"url":null,"abstract":"Mobile agents are autonomous software entities that are able to migrate across different execution environments. The characteristics of mobile agents make them ideal for electronic commerce applications in open networks. Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper, using Pedersen's verifiable secret sharing scheme and the theory of cross validation we propose a payment protocol with the following features: (1) protect the confidentiality of sensitive payment information from spying by malicious hosts, (2) use a trusted third party in a minimal way, (3) can verify the validity of the share by the merchant, (4) allows agent to verify that the product which he is about to receive is the one he is paying for.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Optimistic Payment Protocol with Mobile Agents in Hostile Environments\",\"authors\":\"Yi Liu, Yong Ding\",\"doi\":\"10.1109/NCIS.2011.50\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile agents are autonomous software entities that are able to migrate across different execution environments. The characteristics of mobile agents make them ideal for electronic commerce applications in open networks. Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper, using Pedersen's verifiable secret sharing scheme and the theory of cross validation we propose a payment protocol with the following features: (1) protect the confidentiality of sensitive payment information from spying by malicious hosts, (2) use a trusted third party in a minimal way, (3) can verify the validity of the share by the merchant, (4) allows agent to verify that the product which he is about to receive is the one he is paying for.\",\"PeriodicalId\":215517,\"journal\":{\"name\":\"2011 International Conference on Network Computing and Information Security\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Network Computing and Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCIS.2011.50\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Network Computing and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCIS.2011.50","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Optimistic Payment Protocol with Mobile Agents in Hostile Environments
Mobile agents are autonomous software entities that are able to migrate across different execution environments. The characteristics of mobile agents make them ideal for electronic commerce applications in open networks. Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper, using Pedersen's verifiable secret sharing scheme and the theory of cross validation we propose a payment protocol with the following features: (1) protect the confidentiality of sensitive payment information from spying by malicious hosts, (2) use a trusted third party in a minimal way, (3) can verify the validity of the share by the merchant, (4) allows agent to verify that the product which he is about to receive is the one he is paying for.