Font Size: a A A

E-commerce A Number Of Key Technical Studies,

Posted on:2011-04-02Degree:MasterType:Thesis
Country:ChinaCandidate:S C WanFull Text:PDF
GTID:2199360308467533Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the extensive applications of Internet, modern e-commerce has been developing rapidly; more and more consumers tend to shop online. Development of electronic commerce allows consumers to buy desirable commodities at home, and to enjoy the fun of online shopping. However, there are many insecure factors in online trading, for example, e-commerce users' personal information may be stolen in online shopping process; the consumers may be deceived by illegal traders; normal trading activities were destroyed. These security problems have constrained the development of electronic commerce.E-commerce security protocol is not only an important way to protect the security of e-commerce, but also the core technology of the e-commerce. Its main function is to protect the integrity, fairness, verifiability, non-repudiation of the e-commerce activities. In this paper, two important protocols, proxy signature protocol and electronic auction protocol, were studied in-depth.The major work of this paper is as follows:(1) Some e-commerce security protocols which include proxy signature protocol and electronic auction protocol were systematically studied, and the research on e-commerce security protocols at home and abroad was reviewed.(2) Proxy multi-signature schemes were thoroughly studied. A forward secure hybrid proxy multi-signature scheme was proposed; the security and efficiency of the proposed scheme were in details analyzed. This scheme can solve the problem that the former proxy signature would not be valid or be forged if the secret keys of proxy signers were lost.(3) Electronic auction protocols were deeply studied. A sealed distributed electronic auction protocol was constructed by using hash function. The protocol can preserve the anonymity of bidders. Because the tenders must be opened by all the auctioneers simultaneously; it can also prevent the disadvantages that some auctioneers may know the price in advance prior to others and can largely prevent the auction from deceiving bidders.
Keywords/Search Tags:e-commerce, proxy signature, bilinear pairings, electronic auction, hash chain
PDF Full Text Request
Related items