Abstract
Mobile wallet is one of the commonly used approaches to make disbursement services under financial and business group through mobile applications in the devices such as smart phones, iPads. On the other hand, due to inadequate resource availability of the handheld devices, large-scale computing cannot be performed. When the payment is made through wireless telecommunication network, there are possibilities of threats and attacks the mobile device and the information transacted through the mobile device. In this paper, a hybrid technique is proposed to provide authentication and to solve the key escrow problem. This approach would pay a way to authorize the data and can provide a fair cryptography environment in the transaction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Qin, Z., Sun, J., Wahaballa, A., Zheng, W., Xiong, H., Qin, Z.: A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing. Comput. Stand. Interfaces 54, 55–60 (2017)
Liao, Y., He, Y., Li, F., Zhou, S.: Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement. Comput. Stand. Interfaces (2017)
Weiss, K.: Mobile payments, digital wallets and tunnel vision. Biometric Technol. Today 2011, 8–9 (2011)
Su, H., Wen, X., Zou, D.: A secure credit recharge scheme for mobile payment system in public transport. IERI Procedia 4, 303–308 (2013)
Sujithra, M., Padmavathi, G., Narayanan, S.: Mobile device data security: a cryptographic approach by outsourcing mobile data to cloud. Procedia Comput. Sci. 47, 480–485 (2015)
Simoens, P., Turck, F.D., Dhoedt, B., Demeester, P.: Remote display solutions for mobile cloud computing. Computer 44, 46–53 (2011)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281–308 (1988)
Hess, F.: Efficient identity based signature schemes based on pairings. In: Selected Areas in Cryptography, Proceedings of the 9th Annual International Workshop, SAC 2002, pp. 310–324 (2002)
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Advances in Cryptology—ASIACRYPT 2003, Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, pp. 452–473 (2003)
Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the security of certificateless signature schemes from ASIACRYPT 2003. In: Proceedings of the 4th International Conference Cryptology and Network Security, CANS, pp. 13–25 (2005)
Yu, Y., et al.: Improved certificateless signature scheme provably secure in the standard model. IET Inf. Secur. 6(2), 102 (2012)
Xiong, H.: Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans. Inf. Forensics Secur. 9(12), 2327–2339 (2014)
Xiong, H., et al.: Certificateless threshold signature secure in the standard model. Inf. Sci. 237, 73–81 (2013)
Husni, E.: Dynamic rule encryption for mobile payment. Secur. Commun. Netw. 2017, 1–11 (2017)
Shin, D.-H.: Towards an understanding of the consumer acceptance of mobile wallet. Comput. Hum. Behav. 25(6), 1343–1354 (2009)
Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signatures: new schemes and security models. Comput. J. 55(4), 457–474 (2012)
Coskun, V., et al.: A survey on near field communication (NFC) technology. Wirel. Pers. Commun. 71(3), 2259–2294 (2012)
Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: INFOCOM 2008. Proceedings of the 27th Conference on Computer Communications, pp. 816–824. IEEE (2008)
Kim, B.H., Choi, K.Y., Lee, J.H., Lee, D.H.: Anonymous and traceable communication using tamper-proof device for vehicular ad hoc networks. In: 2007 International Conference on Convergence Information Technology, pp. 681–686 (2007)
Girault, M., Lefranc, D.: Advances in cryptology—ASIACRYPT 2005. In: Proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, Dec 4–8, Proceedings. Springer, Berlin, Heidelberg (2005), Ch. Server-Aided Verification: Theory and Practice, pp. 605–623
Google, Google wallet. https://www.google.com/wallet/
Lara-Niño, C., Miguel, A.M.-S., Arturo, D.-P.: An evaluation of AES and present ciphers for lightweight cryptography on Smartphones. In: Proceedings of the 26th International Conference on Electronics, Communications and Computers (CONIELECOMP’16), pp. 87–93. Cholula, Mexico, Feb 2016
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shibin, D., Kathrine, J.W. (2019). A Secure and Hybrid Approach for Key Escrow Problem and to Enhance Authentic Mobile Wallets. In: Satapathy, S., Bhateja, V., Das, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 105. Springer, Singapore. https://doi.org/10.1007/978-981-13-1927-3_9
Download citation
DOI: https://doi.org/10.1007/978-981-13-1927-3_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1926-6
Online ISBN: 978-981-13-1927-3
eBook Packages: EngineeringEngineering (R0)