Authenticating web-based virtual shops using signature-embedded marks – A practical analysis

Hiroshi Yoshiura, Takaaki Shigematsu, Seiichi Susaki, Tsukasa Saitoh, Hisashi Toyoshima, Chikako Kurita, Satoru Tezuka, Ryoichi Sasaki

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Authenticating Web-based virtual shops is a critical problem in establishing electronic commerce as a social infrastructure. One solution is to use guarantee marks pasted on the Web pages of the virtual shops. However, its effectiveness depends on the reliability of the marks. This paper proposes a verifiable mark system in which digital signatures are embedded in the marks. A prototype authentication system based on this mark system was implemented and evaluated from practical viewpoints. The results show its feasibility.

Original languageEnglish
Title of host publicationSecurity Protocols - 8th International Workshop, Revised Papers
EditorsMichael Roe, Bruno Crispo, Bruce Christianson, James A. Malcolm
PublisherSpringer Verlag
Pages238-248
Number of pages11
ISBN (Print)3540425667, 9783540425663
Publication statusPublished - 2001 Jan 1
Externally publishedYes
Event8th Cambridge International Workshop on Security Protocols, 2000 - Cambridge, United Kingdom
Duration: 2000 Apr 32000 Apr 5

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2133
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th Cambridge International Workshop on Security Protocols, 2000
CountryUnited Kingdom
CityCambridge
Period00/4/300/4/5

    Fingerprint

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Yoshiura, H., Shigematsu, T., Susaki, S., Saitoh, T., Toyoshima, H., Kurita, C., ... Sasaki, R. (2001). Authenticating web-based virtual shops using signature-embedded marks – A practical analysis. In M. Roe, B. Crispo, B. Christianson, & J. A. Malcolm (Eds.), Security Protocols - 8th International Workshop, Revised Papers (pp. 238-248). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2133). Springer Verlag.