##plugins.themes.academic_pro.article.main##

Abstract

E transaction allows to support two parties exchange their obligation over the internet. Based on the RSA algorithm we are going to deal this protocol in this paper. In the existing or previous system , use of third party seems to increase the risk in dealing. In this paper we are going to built an independent web application by removing third party. We Are going to provide security between dealing parties.RSA –based act of finding such a solution, since the third party(court)  is going to involve in the condition if and only if one of  the dealing parties is cheated or the channel is misused. Furthermore the proposed system introduced new technology i.e., Trusted E-Transaction if any party is cheated with the other party then whole transaction is terminated. Active Bundle which is mediator that contain private confidential data proposed system gives security and improve the performance virtual machine that contain protection rules and policies.

             The RSA Algorithm is used for signing and verifying identity the digital signature is the combination of private and public key. the private key plays the role of senders own signature. the senders public key plays the role copy of signature which are available to the public.

##plugins.themes.academic_pro.article.details##

How to Cite
Miss Nilkant Pooja D., Mr Jangam Abhijit R., S. M. B. P. J. A. .D.,. (2014). E-Transaction Without Using Trusted Third Party Based On RSA Signature. International Journal of Emerging Trends in Science and Technology, 1(02). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/13

References

1) Open ID Foundation Website, accessed in Aug. 2010.
2) K. Cameron, “Identity Web blog,” accessed in Aug 2010.Onlineat
3) S.fischer-Hubner ,and H. Hebdom,” PRIME-Privacy and Identity Management for Europe ,” accessed in Aug 2010.
4) M. Abadi, N. Glew, B. Horne, and B. Pinkas.Certified email with a light on-line third party: Design and implementation. In: Proc. of 2000 International World Wide Web Conference (WWW’02), pp. 387-395. ACM press, 2002.
5) N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications, 18(4): 591-606,2000.
6) Ateniese. Efficient verifiable encryption (and fair exchange) of digital signature. In: Proc. of AMC Conference on Computer and Communications Security (CCS’99), pp. 138-146. ACM Press, 1999.
7) G. Ateniese and C. Nita-Rotaru. Stateless-receipient certified E-mail system based on verifiable encryption.
In: CT-RSA’02, LNCS 2271, pp. 182 -199. Springer-Verlag, 2002.