期刊文献+

一种基于身份的在线交易支付安全协议框架 被引量:2

Online Transaction and Payment Security Scheme Based on ID
下载PDF
导出
摘要 利用椭圆曲线GDH群上的双线性,构建了一种基于身份的三方弱型签密协议,提供密文鉴别、报文机密、签名非否认等安全特性,摆脱了PKI体系的约束,提高了计算效率,为在线交易和支付提供一种安全高效的一体化解决方案。 Using the bilinear property of pairing on the elliptic GDH group,a 3- party weak signcryption scheme based on ID is propose& It getts ride of the restriction of PKI system and surpasses the traditional one to one identification model having the securities such as cyphertext identification, message confidentiality, signature nonrepudiation, with high efficiency of computation, thereby providing a kind of integration solution for the online transaction and payment.
出处 《计算机科学》 CSCD 北大核心 2006年第8期109-112,270,共5页 Computer Science
基金 国家十五科技攻关项目:编号2001BA102A04~~
关键词 身份 在线交易 电子支付 安全协议 Identification,Online transaction, Electronic payment,Security scheme
  • 相关文献

参考文献22

  • 1蒋韬 伍评 徐正文.基于PMI技术建立网上网上交易安全系统[J].中国证券信息技术,2002,(8):46-48.
  • 2Ellison C,Schneier B. Ten risks of PKI: What you are not being told about Public Key Infrastructure. Computer Security Journal,2000,16(1)
  • 3Nash A, Duane W,Joseph C, et al. PKI implementing and Managing E-Security. McGraw-Hill Companies,2001.216-249
  • 4Jakobsson M, Mraihi D, Tsiounis Y, et al. Electronic payment :Where do we go from here. In: Lecture Notes on Computer Science. Spring-Valag, 2004,1740 : 43-49
  • 5Dai Xiaoling,Grundy J. Three kinds of E-wallets for net-pay micro-payment system. In.. Lecture Notes on Computer Science.Spring-Valag, 2004,3306 : 66- 70
  • 6Chen Qingfeng, Zhang Chenggai, Zhang Shichao. Veryfying thepayment authorization of SET protocol. In: Lecture Notes on Computer Science. Spring-Valag, 2003,2690 : 914-918
  • 7Lacoste G, Pfitzman B, Steiner M, et al, The electronic payment of framework. In.. Lecture Notes on Computer Science. Spring-Valag, 2004,1854 : 185-211
  • 8Shamir A. Identity-based cryptosystems and signature schemes.In: Blakley G R,Chaum D, eds. Advances in Cryptology - CRYP-TO 1984. Lecture Notes in Computer Science. Springer - Verlag,1984,196:47-53
  • 9Miller V. Uses of elliptic curves in cryptography. In: Advances in Cryptology CRYPTO' 85, Lecture Notes in Computer Science(LNCS), Springer-Verlag, 1838. 385 - 394
  • 10Koblitz N, curve E crvptosvstems, Mathematics of Computation, 1987,48:203-209

同被引文献12

  • 1Ian Foster, Carl Kesselman: 《The Grid 2:Blueprint for a New Computing Infrastructure》, Morgan Kaufmann,2004 年9 月, 144-45.
  • 2许骏等.《网格计算与 e-Learning Grid》.科学出版社,2005年8月,121-125.
  • 3杨胜文,史美林.《向服务的学习评价网格安全体系》,清华大学出版社,2005年10月.
  • 4中国移动通信研究院.分布式业务网络(DSN)技术白皮书[R].北京:中国移动通信研究院,2008.
  • 5Joseph Kramer, Sunil Noronha, John Vergo. A user-centered design approach to personal-ization [ J ]. Communications of the ACM ,2000,43 (8) :44 - 48.
  • 6O' Reilly T. What is web 2.0 : design patterns and business models for the next generation of software [ EB/OL ]. 2005 - 09 - 30.
  • 7Merrill D. Mashups : the new breed of web app[ M ]. IBM ,2006.
  • 8Maximilien E M. Mobile mashups: thoughts, directions and challenges [ C ]//Proceedings of the IEEE International Confer-ence on Semantic Computing ( ICSC' 08 ). Santa Clara, CA, USA. Piscataway, N J, USA : IEEE, 2008 : 607 - 610.
  • 9Chen R, Shen V, Wrobel T, et al. Applying SOA and web 2.0 to telecom:legacy and IMS next-generation architectures [ C ]// Proceedings of the IEEE International Conference on e-Business Engineering ( ICEBE' 08 ), Xi' an, China. Los Alamitos, CA, USA : IEEE Computer Society,2008 : 374 - 379.
  • 10WANG Fen-qian. Research on the methods of payment via the Internet and mobile phones[ J]. 2011 International Conference on E-Business and E-Government. May 6th to 8th ,2011 in Shanghai, China. IEEE Computer Society,445 Hoes Lane-P. OBox 1331, Piscataway, NJ 08855 - 1331, United States,2011,8 : 7 234 - 7 237.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部