期刊文献+

基于自验证机制的动态对称密钥移动商务方案

Dynamic Symmetric Key Mobile Commerce Scheme Based on Self Authentication Mechanism
下载PDF
导出
摘要 针对移动电子商务对安全性、高效性的要求,总结安全电子交易协议,以及基于证书公钥密码体制、基于身份密码加密体制、基于自验证电子签名体制对移动电子商务方案的优缺点,设计开发了一种新型的基于自验证机制的动态对称密钥移动商务系统,研究了基于椭圆的自验证机制对移动商务方案的影响.结果表明:方案利用动态对称密钥、哈希函数等方法提高了系统的高效性,使用用户确认机制增强了系统的安全性,较之现行的大部分移动商务方案更有效、更实用. According to the requirements of security and high efficiency for mobile E-commerce,the advantages and disadvantages of the mobile E-commerce were summarized based on the certificate-based public-key cryptography,ID-based cryptography,and self-verified digital signature. A new type of dynamic symmetric key mobile commerce scheme based on self-authentication mechanism was proposed,and then the ECC-based authentication schemewas analyzed. Results show that the efficiency of the scheme is improved by using dynamic symmetric key,hash functionand other measures,and the user's confirmation mechanism enhances the security. Therefore,the proposed scheme is more efficient and practical than most of the existing schemes.
出处 《天津大学学报(自然科学与工程技术版)》 EI CSCD 北大核心 2016年第6期567-573,共7页 Journal of Tianjin University:Science and Technology
基金 教育部新世纪优秀人才计划基金资助项目(NCET-12-0400) 国家自然科学基金青年基金资助项目(61101224) 中国博士后基金资助项目(2012M520574) 航空基金资助项目(2012ZC48003) 天津市自然科学基金青年基金资助项目(12jcqnjc00500)
关键词 电子商务 动态对称密钥 自验证机制 安全性 高效性 E-commerce dynamic symmetric key self-authentication mechanism security high efficiency
  • 相关文献

参考文献21

  • 1Lai I K W,Lai D C F. User acceptance of mobile commerce:An empirical study in Macao[J]. InternationalJournal of Systems Science,2014,45(6):1321-1331.
  • 2Ngai E W T,Gunasekaran A. A review for mobile commerceresearch and applications[J]. Decision SupportSystems,2007,43(1):3-15.
  • 3Lin P,Chen H Y,Fang Y,et al. A secure mobile electronicpayment architecture platform for wireless mobilenetworks[J]. IEEE Transactions on Wireless Communication,2008,7(7):2705-2713.
  • 4Yang J H,Chang C C. A Low computational-cost electronicpayment scheme for mobile commerce with largescalemobile users[J]. Wireless Personal Communications,2012,63(1):83-99.
  • 5马丰宁,张俊.基于SET协议的网上支付系统的总体设计[J].天津大学学报(自然科学与工程技术版),2002,35(1):71-74. 被引量:3
  • 6Chen Yu-Jen,Hsieh Wen-Chuan,Chen Wei,et al. Anefficient and secure micro-payment protocol for mobilecommerce[C]//9,th World Multi-Conference on Systemics,Cybernetics and Informatics. Orlando,USA,2005:7-12.
  • 7刘哲理,贾春福,孙涛,李经纬,纪鸿舜.基于对技术身份密码学的构造方法[J].天津大学学报,2011,44(12):1050-1056. 被引量:1
  • 8Tsaur W J. Several security schemes constructed usingECC-based self-certified public key cryptosystems[J].IEICE Trans on Applied Mathematics and Computation,2005,168(1):447-464.
  • 9周绯菲,鲁士文.RSA算法的内在特性、破解与防范措施[J].天津大学学报,2006,39(B06):379-382. 被引量:4
  • 10Zakerolhosseini A,Nikooghadam M. Secure transmissionof mobile agent in dynamic distributed environments[J]. Wireless Personal Communications,2013,70(2):641-656.

二级参考文献30

  • 1郭锋,庄奕琪,胡斌.基于流密码算法构造跳频序列簇(英文)[J].电子器件,2007,30(5):1696-1699. 被引量:2
  • 2黄红梅,生加明,徐结绿,汪成策.关于RSA公钥体制应用中几个问题的探讨[J].通信技术,2003,36(2):84-86. 被引量:2
  • 3田野,张玉军,李忠诚.使用对技术的基于身份密码学研究综述[J].计算机研究与发展,2006,43(10):1810-1819. 被引量:16
  • 4Shamir A. Identity-based schemes [G]. Advances cryptosystems and signature in Cryptology-Crypto'84. Berlin, Germany: Springer-Verlag, 1984:47-53.
  • 5Sakai R, Ohgishi K, Kasahara M. Cryptosystems based on pairings [C]// Symposium on Cryptography and In- formation Security (SCIS) 2000. Okinawa, Japan, 2000 : 26-28.
  • 6Boneh D, Franklin M. Identity-based encryption from the Weil pairing [G]. Advances in Cryptology-Crypto' 01. Berlin, Germany: Springer-Verlag, 2001: 213-229.
  • 7Cocks C. An identity based encryption scheme based on quadratic residues[C]//Proceedings of the 8th IMA International Conference on Cryptography and Coding. Berlin, Germany: Springer-Verlag, 2001: 360-363.
  • 8Dutta R, Barua R, Sarkar E Pairing-based Cryptographic Protocols: A Survey [R]. Cryptology ePrint Archive, Report 2004/064. http: //eprint. iacr. org/2004/ 064. 2004.
  • 9Baek J, Newmarch J, Naini R, et al. A survey of identity-based cryptography [C]// Proceedingings 10th An- nual Conference for Australian Unix User's Group(AUUG2004). Canberra, Australia, 2004: 95-102.
  • 10Gorantla M. C, Gangishetti R, Saxena A. A survey on ID-based cryptographic primitives [EB/OL]. Cryptology ePrint Archive, Report2005/094, from http: // eprint. iaer. org/2005/094. 2005.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部