电子合同签名协议的研究与应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字签名技术的完善和电子签名法的实施,推动了电子商务的发展。电子商务的应用也越来越广泛,在其应用中电子合同解决方案是近几年来研究的热点。但是目前国内外学者设计的电子合同签名协议并不完善,而且大都停留在理论研究阶段。
     论文以电子商务中交易的合法性、安全性和平等性为研究背景,针对目前电子合同签名协议中存在的问题(即如果合同的发起者长时间没有收到响应者的合同签名,将会一直处于等待状态),设计了一个安全高效的电子合同签名协议,该协议包括三个子协议:合同签名交换子协议、签名取消子协议和争端解决子协议。论文设计的签名取消子协议能够取消合同发起者的签名,如果发生异常情况,签名者也不会一直处于等待状态。论文应用电子合同签名协议、密码学、数字签名技术和J2EE技术,开发了一个电子合同签署系统。系统基于浏览器/服务器模式构建,以Eclipse作为开发工具,MySQL作为后台数据库。系统采用业务流程图构建系统逻辑模型,实现了用户密钥生成、电子合同处理、合同签名生成、合同签名验证以及异常情况处理等五大功能模块。系统中三重DES加密算法的使用,保证了合同信息的安全性。数字信封技术的运用,解决了对称密钥分发的难题,SHA-1哈希函数的使用验证了合同信息是否被篡改。
     虽然在中国已经出现了首份电子合同,但是在世界范围内传统纸制的合同还占统治地位,电子合同还没有广泛应用。论文实现的电子合同签署系统能够安全高效地签署电子合同,具有一定的理论价值和应用价值。
The perfection of digital signature technology and the implementation of Electronic Signature Law promote the development of E-commerce. The application of E-commerce becomes widely. In its application, electronic contracts solution is a hot spot in recent years. But currently the designed electronic contract signing protocols by domestic and foreign scholars are not perfect and almost in theoretical research stage.
     This paper is based on the legitimacy, security and equality of the transaction in E-commerce. In order to solve the existing problems of electronic contract signing protocols that is if the sponsor of contract doesn't receive the contract signature of responder, he will wait all the time. This paper designed a secure and efficient electronic contract signing protocol which includes three sub-protocols: contract signing exchange sub-protocol, contract cancellation sub-protocol and dispute resolve sub-protocol. In exception, the signing cancellation sub-protocol in this paper can cancel the signing of contract sponsor, so he will not wait all the time. This paper also applied the electronic contract signing protocol, cryptology and J2EE technique, developed a contract sign system. The system is based on B/S mode, using eclipse as development tool, MySQL database software. The system uses business flow chart to build system logic module, implementing five function modules: generate of user key, the deal with of electronic contract, generate of contract signing, contract signing verify and the deal with of exception. The use of treble DES cryptographic algorithm makes the security of contract information. The use of digital envelope technology resolved the hard problem of key distribution. The SHA-1 hash function validates the contract information whether it is varied.
     Although the first electronic contract has already emerged in China, in the world traditional paper contracts still dominate. Electronic contracts hasn't widely used. The electronic contract signing system in this paper could sign secure and efficient electronic contract; it also has theoretical value and application value.
引文
[1] Ben-Or M, Goldreich O, Micali S et al. A fair protocol for signing contracts, IEEE Transactions on Information Theory, 1990, 36(1): 40-46.
    [2] Asokan N, Schunter M, Waidner M. Optimistic protocols for fair exchange. 4th ACM Conference on Computer and Communications Security, Zurich, 1997:8-17.
    [3] Micali S. Simple and fast optimistic protocols for fair electronic exchange. Twenty-Second Annual ACM Sigact-Sigops Symposium on Principles of Distributed Computing, Boston, 2003:12-19.
    [4] 曲亚东,侯紫峰.基于不经意传输的合同签订协议.计算机研究与发展,2003,40(4):615-619.
    [5] 袁丹,孟波.基于Web的谈判支持系统合同数字签名的设计.计算机工程,2005,31(2):166-168.
    [6] 杨波,王芷玲,张玉清.一个公平电子合同签署协议的设计.计算机工程,2006,32(19):159-161.
    [7] 周永彬,张振峰,卿斯汉等.基于RSA签名的优化公平交换协议.软件学报,2004,15(7):1049-1055.
    [8] Bao F, Wang G L, Zhou J Y et al. Analysis and improvement of micali's fair contract signing protocol. Internet Corporation for Assigned Names and Numbers, Sydney, 2004:176-187.
    [9] Wang G L. An abuse-free fair signing protocol based on the RSA signature. 14th International World Wide Web Conference, Chiba, 2005:412-421.
    [10] 章照止.现代密码学基础.北京:北京邮电大学出版社,2004.
    [11] Wiley B S, Sons J W. Applied cryptography(second edition:protocols, algorthms, and source code in C).New York:John Wiley&Sons Inc, 1996.
    [12] 孙燮华.计算机密码学的新进展.中国计量学院学报,2001,12(1):1-18.
    [13] 李如忠.数据加密和数字签名技术在局域网中的应用.计算机应用研究,2004,12(5):160-162.
    [14] 卢开澄.计算机密码学.北京:清华大学出版社,2003.
    [15] 徐秋亮.改进门限RSA数字签名体制.计算机学报,2000,23(5):449-453.
    [16] 章照止.现代密码学基础.北京:北京邮电大学出版社,2004.
    [17] 冯登国.国内外密码学研究现状及发展趋势.通信学报,2002,23(5):18-26.
    [18] 邹战波.数字签名技术的研究及在电子政务中的应用:(硕士学位论文).大连:大连理工大学,2005.
    [19] Orlowski S. Electronic authentication-more than just digital signatures. Computer Law & Security Report. 2000,16(1):28-32.
    [20] Rivest R, Shamir A, Adleman L.A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 1978,21(2):120-126.
    [21] 闫会娟.基于Hash函数的动态密钥分存技术:(硕士学位论文).大连:大连海事大学,2006.
    [22] 赵小明,章美仁.RSA数字签名技术住电子公文流转中的应用.计算机工程与设计,2005,5(26):1214-1216.
    [23] 杨波.现代密码学.北京:清华大学出版社,2003.
    [24] 李波.电子政务和商务中应用的数字签名研究:(硕士学位论文).西安:西安交通大学,2003.
    [25] ElGamal T.A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 1985, 31 (4):469-472.
    [26] 赵泽茂.数字签名理论.北京:科学出版社,2007.
    [27] Mohan A.数字签名.贺军译.北京:清华大学出版社,2003.
    [28] Oded G. Foundations of cryptography. Beijing:Publishing House of Electronics Industry, 2005.
    [29] 汤惟.密码学与网络安全技术基础.北京:机械工业出版社,2004.
    [30] Wade T,Lawrence C.密码学概论.邹红霞,许鹏文,李勇奇译.北京:人民邮电出版社,2004.
    [31] 张焕国,刘玉珍.密码学引论.武汉:武汉大学出版社,2003.
    [32] Bao F, Deng R H,Mao W B. Efficient and practical fair exchange protocols with off-line TTP. 1998 IEEE Symposium on Security and Privacy, Oakland, 1998:77-85.
    [33] Asokan N. Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications, 2000,18(4):593-610.
    [34] Asokan N, Shoup V. Protocols for optimistic fair exchange. 1998 IEEE Symposium on Security and Privacy, Oakland, 1998:6-17.
    [35] 李平.基于证书认证机制的公平文件交换协议的算法设计.湖南大学学报,2004,31(1):66-70.
    [36] 王彩芬,葛建华,杨世勇.带半可信第三方的公平非否认交换协议.华中科技大学学报,2000,29(7):4-6.
    [37] Schneier B. Applied cryptograpy-protocols, algorithms, and source code in C (Second Edition).New York:John Wiley&Sons Inc, 1996.
    [38] Ateniese G. Efficient verifiable encryption (and fair exchange) of digital signatures. 6th ACM conference on Computer and communications security, Singapore, 1999:138-146.
    [39] 徐迎晓.Java安全性编程实例.北京:清华大学出版社,2003.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700