期刊文献+

通信限制场景下的安全移动支付协议研究 被引量:2

Research of security mobile payment protocol in communication restrictions scenarios
下载PDF
导出
摘要 大部分现有的移动支付方法都是在完全连接场景下进行的,随着移动电子商务的多样化,现有的移动支付方法已经不能满足移动通信限制场景的要求。为了解决移动通信限制场景下移动支付的安全性问题,在研究3-Dsecure协议的基础上,在商家中心场景(客户和发卡行不能直接连接)下,提出一种新的安全移动支付协议。该协议采用消息恢复签名和对称加密,提供了参与实体之间的相互认证,并实现了匿名性、消息的秘密性和完整性,最后通过改进的Kailar逻辑对协议进行验证,该协议满足可追究性的要求。 Lots of existing mobile payment protocols are based on the scenarios of full connectivity. Because of the diversity of M-commerce the existing mobile payment protocols could not meet the requirements of mobile restrictions communication scenarios. To solve the security issue of the mobile payment in the restrictions communication scenarios, a new security mobile payment protocol in the merchant center scenarios (customers and issuers can not be directly connected) based on studying the 3-D secure protocol is proposed. The protocol uses the message recovery signature scheme and symmetric encryption and provides mutual authentication between the participating entities, and then achieves the anonymity, confidentiality of information and integrity. The new protocol is verified by using the advanced Kailar logic, and results show that the protocol guarantees accountability.
作者 崔楠 汪学明
出处 《计算机工程与设计》 CSCD 北大核心 2010年第9期1950-1953,共4页 Computer Engineering and Design
基金 贵州省自然科学基金项目(20052110) 贵州大学引进人才科研基金项目(2008005)
关键词 移动支付 通信限制场景 消息恢复签名 可追究性 匿名性 mobile payment communication restrictions scenarios message recovery signature scheme accountability anonymity
  • 相关文献

参考文献8

  • 1SECPay Ltd:3-D secure integration and user guide[R].2006.
  • 2Chaff S,Kermani P,Smith S,et al.Security issues in M-commerce:a usage-based taxonomy[C].Proceedings of E-Commerce Agents,2001:264-282.
  • 3Chang Y,Chang C,Huang H.Digital signature with message recovcry using self-certified public keys without trustworthy system authority[J].Journal of Applied Mathematics and Computation,2005,161(1):211-227.
  • 4周典萃,卿斯汉,周展飞.Kailar逻辑的缺陷[J].软件学报,1999,10(12):1238-1245. 被引量:29
  • 5Hu Z,Liu Y,Hu X,et al.Anonymous micropayments authentication in mobile data network[C].Proceedings of INFOCOM,2004.
  • 6吴小强,刘晶,李秀生,邱菀华.3D安全协议的改进及应用[J].控制与决策,2005,20(4):463-466. 被引量:2
  • 7李曦,胡汉平.一种安全的移动支付方法[J].计算机应用研究,2008,25(5):1546-1549. 被引量:12
  • 8Chaobo Yang,Ming Qi.Scheme and applications of mobile payment based on 3-D security protocol[C].Proceedings of the 3rd International Conference on Mobile Technology,Applications & Systems,2006.

二级参考文献23

  • 1沈延生.对村民自治的期望与批评[A]..中国农村研究(2002年卷)[C].北京:中国社会科学出版社,2003..
  • 2Zhou J,Proc ’96 IEEE Sympo Security and Privacy,1996年,55页
  • 3Deng R H,J Network System Management,1996年,4卷,3期,279页
  • 4Ranganathan C, Ahobha Ganapathy. Key dimensions of business-to-customer web sites[J]. Information and Management,2002,39(1):457-465.
  • 5Visa Int Service Association. 3D Secure protocol specification core functions[EB/OL].http://international.visa.com/fb/paytech/secure/main.jsp.2003/2004-01-07.
  • 6Hwang J J, Yeh T C, Li J B. Securing on-line credit card payments without disclosing privacy information[J]. Computer Standards and Interfaces,2003,25(2):119-129.
  • 7Wu X Q, A hybrid approach in intelligent workflow modeling using Petri nets and neural network for inter-organizational cooperation[A]. The 8th Int Conf on CSCW in Design[C].Xiamen,2004:307-311.
  • 8Coffey T, Saidha P. Non-repudiation with mandatory proof of receipt[J]. Computer Communication Review,1996,26(1):6-17.
  • 9Petra van Krugten, Mark Hoogenboom. B2C security-be just secure enough[J].Computers and Security,2000,19(4):348-356.
  • 10Eloy Portillo, Ahmed Patel. Design methodology for secure distributed transactions in electronic commerce[J]. Computer Standards and Interfaces,1999,21(3):5-18.

共引文献40

同被引文献18

  • 1尹虎,张向军,陈克非.一种无线网络环境中的微支付协议[J].计算机工程,2005,31(12):221-222. 被引量:2
  • 2刘军,廖建新.一种通用移动支付模型及其协议的研究[J].高技术通讯,2006,16(6):560-565. 被引量:5
  • 3陈莉,张浩军,祝跃飞.一种新的移动商务小额支付协议[J].计算机应用,2007,27(8):2059-2061. 被引量:4
  • 4Chen,L.,Li,X.,&Shi,M.(2007).A novel micro-payment scheme for m-commerce based on self-renewalhash chains.In Proceedings of2007international conference on communications,circuits,and systems,Japan(pp.1343-1346).
  • 5Lin,P.,Chen,H.Y.,Fang,Y.,Jeng,J.Y.,&Lu,F.S.(2008).A secure mobile electronic payment architecture platform for wireless mobile networks.IEEE Transactions on Wireless Communications,7(7),2705-2713.
  • 6Joonsang Baek,Ron Steinfeld,Yuliang Zheng.Formal Proofs for the Security of Signcryption[J].Journal of Cryptology.2007(2)
  • 7Mona Hosseinkhani,Ebrahim Tarameshloo,Mehdi Shajari.AM-VPayword:Secure and efficient anonymous payword-basedmicropayment scheme[].International Conference on Computa-tional Intelligence and Security.2010
  • 8Haller N,Metz C,Nesser P,et al.A one-time passwordsystem[].RFC.2005
  • 9Hwang M S,Sung P C.A study of micro-payment based on one-way hash chain[].International Journal of Network Security.2006
  • 10WU Chia-chi,CHANG Chin-chen,LIN Iuon-chang.An authenti-cated payword scheme without public key cryptosystems[].In-ternational Journal of Innovative ComputingInformation andControl.2009

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部