A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users
- 449 Downloads
The electronic transactions on wireless mobile networks, which are also called mobile commerce, become more and more popular in recent years. In mobile commerce, the electronic payment is the most important component and thus many electronic payment schemes for mobile commerce are proposed. However, these schemes need to maintain a large authentication table for a large amount of mobile users. In addition, these schemes have heavy computation loads so they are not suitable for low computational-ability mobile devices. To overcome the above drawbacks, we propose a low computation-cost electronic payment scheme for mobile commerce in this paper. The proposed scheme can be applied to large-scale mobile user environments without maintaining a large authentication table. Moreover, the proposed scheme has low computation loads for mobile users because the elliptic curve cryptography is adopted in the proposed scheme. Therefore, the proposed scheme is more efficient and practical than the related works.
KeywordsElectronic payment User authentication Elliptic curve cryptography Mobile networks Mobile commerce
Unable to display preview. Download preview PDF.
- 1.Global System for Mobile Communications, http://www.gsmworld.com/.
- 2.The Third Generation Partnership Project, http://www.3gpp.org/.
- 3.Chen, L., Li, X., & Shi, M. (2007). A novel micro-payment scheme for m-commerce based on self-renewal hash chains. In Proceedings of 2007 international conference on communications, circuits, and systems, Japan (pp. 1343–1346).Google Scholar
- 7.Chaum, D., Fiat, A., & Naor, M. (1990). Untraceable electronic cash. Advances in cryptology-CRYPTO’88. Lecture notes in computer science, Springer (Vol. 403, pp. 319–327).Google Scholar
- 10.Tsao C. J., Chen C. Y., Ku C. Y. (2002) An electronic bearer check system. IEICE Transactions on Communications 85(B(1): 325–331Google Scholar
- 12.Revist, R., & Shamir, A. (1997). Pay Word and MicroMint: Two simple micropayment schemes. In Proceedings of the fourth security protocol international workshop. Lecture notes in computer science, Springer (Vol. 1189, pp. 69–87).Google Scholar
- 15.Lee M., Ahn G., Kim J., Park J., Lee B., Kim K., Lee H. (2002) Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem. Journal of Communications and Networks 4(2): 81–89Google Scholar
- 20.Schnorr, C. P. (1990). Efficient identification and signatures for smart cards. Advances in cryptology-EUROCRYPTO’89. Lecture notes in computer science, Springer (Vol. 434, pp. 239–252).Google Scholar
- 21.Huang, Q., Cukier, J., Kobayashi, H., Liu, B., & Zhang, J. (2003). Fast authenticated key establishment protocols for self-organizing sensor networks. In Proceedings of 2nd ACM International Conference on Wireless Sensor Networks and Applications (pp. 141–150).Google Scholar
- 23.Malan, D., Welsh, M., & Smith, M. (2004). A public-key infrastructure for key distribution in tinyOS based on elliptic curve cryptography. In Proceedings of the 1st IEEE international conference on sensor and ad hoc communications and networks (pp. 71–80).Google Scholar
- 24.Kotzanikolaou P., Magkos E., Vergados D., Stefanidakis M. (2009) Secure and practical key establishment for distributed sensor networks. Security and Communication Networks 2(6): 595–610Google Scholar
- 26.Advanced Encryption Standard, http://csrc.nist.gov/archieve/aes/.
- 27.Standards for efficient cryptography (SECG), SEC1: Elliptic curve cryptography version 2.0, http://www.secg.org/download/aid-780/sec1-v2.pdf.