A Secure Mobile Payments Protocol Based on ECC

Article Preview

Abstract:

Owing to the limitations of mobile terminals and network bandwidth, the current Secure Electronic Transaction (SET) protocol can not be introduced into mobile payment directly. Present mobile payment system often uses symmetric encryption algorithm that may bring in some security risks. A new secure mobile payment protocol based on ECC was presented ,which ensures information flows from merchant to customer and enhances the security of customer’s information. Theoretical analysis shows that, ECC can not only meet the requirements of short key generation time, but also ensure that at the same time of cracking code the ratio of RSA and ECC key length is greater than 5:1. The number of signing the certificate verification, asymmetric and symmetric encryption of the new protocol is also lesser than SET protocol, so the current mobile terminal and network capabilities can support this protocol to ensure safe and effective mobile payment process.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

151-154

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] BBC News, UN: Six billion mobile phone subscriptions in the world, accessed on 6 April 2013 from: http: /www. bbc. co. uk/news/technology-19925506.

Google Scholar

[2] LLC, SET Secure Electronic Transaction. SET Secure Electronic Transaction Specification. ,  Book 1: Business Description. Version 1 (2002).

Google Scholar

[3] Bellare M, Garay J A, Hauser R, et al. Design, implementation, and deployment of the iKP secure electronic payment system [J]. Selected Areas in Communications, IEEE Journal on, 2000, 18(4): 611-627.

DOI: 10.1109/49.839936

Google Scholar

[4] Jurišic A, Menezes A. Elliptic curves and cryptography [J]. Dr. Dobb's Journal, 1997: 26-36.

Google Scholar

[5] Jeng F G, Chen T L, Chen T S. A blind signature scheme based on elliptic curve cryptosystem[C]/INC, IMS and IDC, 2009. NCM'09. Fifth International Joint Conference on. IEEE, 2009: 2044-(2049).

DOI: 10.1109/ncm.2009.343

Google Scholar

[6] Biometrics Institute, [Online] available at http: /www. biometricsinstitute. org. Last accessed February (2012).

Google Scholar