Reference Hub1
Remote Digital Signing for Mobile Commerce

Remote Digital Signing for Mobile Commerce

Oguz Kaan Onbilger, Randy Chow, Richard Newman
Copyright: © 2005 |Pages: 22
ISBN13: 9781591403456|ISBN10: 1591403456|ISBN13 Softcover: 9781591403463|EISBN13: 9781591403470
DOI: 10.4018/978-1-59140-345-6.ch012
Cite Chapter Cite Chapter

MLA

Onbilger, Oguz Kaan, et al. "Remote Digital Signing for Mobile Commerce." Advances in Security and Payment Methods for Mobile Commerce, edited by Wen-Chen Hu, et al., IGI Global, 2005, pp. 263-284. https://doi.org/10.4018/978-1-59140-345-6.ch012

APA

Onbilger, O. K., Chow, R., & Newman, R. (2005). Remote Digital Signing for Mobile Commerce. In W. Hu, C. Lee, & W. Kou (Eds.), Advances in Security and Payment Methods for Mobile Commerce (pp. 263-284). IGI Global. https://doi.org/10.4018/978-1-59140-345-6.ch012

Chicago

Onbilger, Oguz Kaan, Randy Chow, and Richard Newman. "Remote Digital Signing for Mobile Commerce." In Advances in Security and Payment Methods for Mobile Commerce, edited by Wen-Chen Hu, Chung-wei Lee, and Weidong Kou, 263-284. Hershey, PA: IGI Global, 2005. https://doi.org/10.4018/978-1-59140-345-6.ch012

Export Reference

Mendeley
Favorite

Abstract

Mobile agents (MAs) are a promising technology which directly address physical limitations of mobile devices such as limited battery life, intermittent and low-bandwidth connections, with their capability of providing disconnected operation. This chapter addresses the problem of digital contract signing with MAs, which is an important part of any mobile commerce activity and one special challenging case of computing with secrets remotely in public. The authors use a multi-agent model together with simple secret splitting schemes for signing with shares of a secret key carried by MAs, cooperating to accomplish a trading task. In addition to known key splitting techniques of RSA, authors introduce similar techniques for El Gamal and DSS public key cryptosystems. The objective is to achieve a simple and ubiquitous solution by using the well-known public-key cryptosystem implementations, which conform to the established standards.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.