A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography

  • Chao-Wen Chan
  • Chih-Hao Lin
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5075)

Abstract

With the increasing usage of credit cards, secure requirements for handling credit card payment have become more critical. Today, it is being deployed for a wide application services in mobile commerce over public networks. Based on the security of Naor-Shamir’s visual cryptography, Diffie-Hellman key agreement scheme and symmetric cryptosystems, we propose a new credit card payment scheme using mobile phones based on visual cryptography. Compared with traditional credit card payment methods’, the proposed scheme can provide more secure communication for many electronic commerce transactions.

Keywords

payment secret sharing visual cryptography key agreement 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman Key Agreement Schemes. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  2. 2.
    Bottoni, A., Dini, G.: Improving Authentication of Remote Card Transactions with Mobile Personal Trusted Devices. Computer Communications 30, 1697–1712 (2007)CrossRefGoogle Scholar
  3. 3.
    Blundo, C., De Santis, A., Naor, M.: Visual Cryptography for Grey Level Images. Information Processing Letters 75(6), 255–259 (2000)CrossRefMathSciNetGoogle Scholar
  4. 4.
    Chang, C.C., Hwang, M.S., Cheng, T.S.: A New Encryption Algorithm for Image Cryptosystems. The Journal of Systems and Software 58, 83–91 (2001)CrossRefGoogle Scholar
  5. 5.
    Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)CrossRefMATHMathSciNetGoogle Scholar
  6. 6.
    Lin, C.C., Tsai, W.H.: Visual Cryptography for Gray-level Images by Dithering Techniques. Pattern Recognition Letters 24(1-3), 349–358 (2003)CrossRefGoogle Scholar
  7. 7.
    Lukac, R., Plataniotis, K.N.: Bit-level Based Secret Sharing for Image Encryption. Pattern Recognition 38(5), 767–772 (2005)CrossRefMATHGoogle Scholar
  8. 8.
    Maurer, U.: Towards the Equivalence of Breaking the Diffie-Hellman Scheme and Computing Discrete Logarithms. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 271–281. Springer, Heidelberg (1994)Google Scholar
  9. 9.
    Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  10. 10.
    National Institute of Standards and Technology: Advanced Encryption Standard, FIPS 197 (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Chao-Wen Chan
    • 1
  • Chih-Hao Lin
    • 1
  1. 1.Graduate School of Computer Science and Information TechnologyNational Taichung Institute of TechnologyTaichungTaiwan

Personalised recommendations