dc.description.abstract | During the period of recent ten years, distributed computing architecture has evolved into the form of large scale and mobile computing. Traditional client/server computing systems were gradually replaced by a new generation of technique - Mobile Agent. Several features such as network load reduction or autonomy made this technique get popular rapidly and be applied widely in various environments.
Mobile agent and two types of mobile agent security will be first introduced, and then some known threats and some existing solutions/techniques will be reviewed. Moreover, with the rising and flourishing development of network and communication technology, electronic commerce becomes the most popular and hottest due to the vast business opportunities and convenience it brings. Naturally, mobile agent techniques were also be applied in different electronic commerce environments. The most common example is that a mobile agent is used to find and collect various offers for a certain good on behalf of its owner. How to protect the integrity of these offers is an important topic. Hence, some proposed and well-known methods for mobile agent collected data protection will be discussed.
Among most proposed methods, no single protocol can achieve forward privacy and publicly verifiable forward integrity simultaneously due to the use of traditional digital signature. And therefore, an improved collected data protection protocol will be proposed. With the ring signatures technique, the proposed protocol can achieve forward privacy and publicly verifiable forward integrity simultaneously. Related security analyses and comparisons with previous works will be discussed. Besides, the offer will not be transferable when each host selects its ring members appropriately.
Moreover, an extension of the proposed protocol will be proposed. By applying the ID-based chameleon signature to some electronic transactions, the offer is not transferable as well. Besides, the proposed application neither disarranges the quotations on the market nor leads to vicious competitions. Furthermore, it is also practical for further implementations. Finally, we conclude this thesis and introduce some future research directions and possible applications. | en_US |