Skip to main content

A Secure and Hybrid Approach for Key Escrow Problem and to Enhance Authentic Mobile Wallets

  • Conference paper
  • First Online:
Smart Intelligent Computing and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 105))

Abstract

Mobile wallet is one of the commonly used approaches to make disbursement services under financial and business group through mobile applications in the devices such as smart phones, iPads. On the other hand, due to inadequate resource availability of the handheld devices, large-scale computing cannot be performed. When the payment is made through wireless telecommunication network, there are possibilities of threats and attacks the mobile device and the information transacted through the mobile device. In this paper, a hybrid technique is proposed to provide authentication and to solve the key escrow problem. This approach would pay a way to authorize the data and can provide a fair cryptography environment in the transaction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Qin, Z., Sun, J., Wahaballa, A., Zheng, W., Xiong, H., Qin, Z.: A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing. Comput. Stand. Interfaces 54, 55–60 (2017)

    Article  Google Scholar 

  2. Liao, Y., He, Y., Li, F., Zhou, S.: Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement. Comput. Stand. Interfaces (2017)

    Google Scholar 

  3. Weiss, K.: Mobile payments, digital wallets and tunnel vision. Biometric Technol. Today 2011, 8–9 (2011)

    Article  Google Scholar 

  4. Su, H., Wen, X., Zou, D.: A secure credit recharge scheme for mobile payment system in public transport. IERI Procedia 4, 303–308 (2013)

    Article  Google Scholar 

  5. Sujithra, M., Padmavathi, G., Narayanan, S.: Mobile device data security: a cryptographic approach by outsourcing mobile data to cloud. Procedia Comput. Sci. 47, 480–485 (2015)

    Article  Google Scholar 

  6. Simoens, P., Turck, F.D., Dhoedt, B., Demeester, P.: Remote display solutions for mobile cloud computing. Computer 44, 46–53 (2011)

    Article  Google Scholar 

  7. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  8. Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281–308 (1988)

    Article  MathSciNet  Google Scholar 

  9. Hess, F.: Efficient identity based signature schemes based on pairings. In: Selected Areas in Cryptography, Proceedings of the 9th Annual International Workshop, SAC 2002, pp. 310–324 (2002)

    Chapter  Google Scholar 

  10. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Advances in Cryptology—ASIACRYPT 2003, Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, pp. 452–473 (2003)

    Chapter  Google Scholar 

  11. Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the security of certificateless signature schemes from ASIACRYPT 2003. In: Proceedings of the 4th International Conference Cryptology and Network Security, CANS, pp. 13–25 (2005)

    Google Scholar 

  12. Yu, Y., et al.: Improved certificateless signature scheme provably secure in the standard model. IET Inf. Secur. 6(2), 102 (2012)

    Article  Google Scholar 

  13. Xiong, H.: Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans. Inf. Forensics Secur. 9(12), 2327–2339 (2014)

    Article  Google Scholar 

  14. Xiong, H., et al.: Certificateless threshold signature secure in the standard model. Inf. Sci. 237, 73–81 (2013)

    Article  MathSciNet  Google Scholar 

  15. Husni, E.: Dynamic rule encryption for mobile payment. Secur. Commun. Netw. 2017, 1–11 (2017)

    Article  Google Scholar 

  16. Shin, D.-H.: Towards an understanding of the consumer acceptance of mobile wallet. Comput. Hum. Behav. 25(6), 1343–1354 (2009)

    Article  Google Scholar 

  17. Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signatures: new schemes and security models. Comput. J. 55(4), 457–474 (2012)

    Article  Google Scholar 

  18. Coskun, V., et al.: A survey on near field communication (NFC) technology. Wirel. Pers. Commun. 71(3), 2259–2294 (2012)

    Article  Google Scholar 

  19. Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: INFOCOM 2008. Proceedings of the 27th Conference on Computer Communications, pp. 816–824. IEEE (2008)

    Google Scholar 

  20. Kim, B.H., Choi, K.Y., Lee, J.H., Lee, D.H.: Anonymous and traceable communication using tamper-proof device for vehicular ad hoc networks. In: 2007 International Conference on Convergence Information Technology, pp. 681–686 (2007)

    Google Scholar 

  21. Girault, M., Lefranc, D.: Advances in cryptology—ASIACRYPT 2005. In: Proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, Dec 4–8, Proceedings. Springer, Berlin, Heidelberg (2005), Ch. Server-Aided Verification: Theory and Practice, pp. 605–623

    Google Scholar 

  22. Google, Google wallet. https://www.google.com/wallet/

  23. Lara-Niño, C., Miguel, A.M.-S., Arturo, D.-P.: An evaluation of AES and present ciphers for lightweight cryptography on Smartphones. In: Proceedings of the 26th International Conference on Electronics, Communications and Computers (CONIELECOMP’16), pp. 87–93. Cholula, Mexico, Feb 2016

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Shibin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shibin, D., Kathrine, J.W. (2019). A Secure and Hybrid Approach for Key Escrow Problem and to Enhance Authentic Mobile Wallets. In: Satapathy, S., Bhateja, V., Das, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 105. Springer, Singapore. https://doi.org/10.1007/978-981-13-1927-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1927-3_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1926-6

  • Online ISBN: 978-981-13-1927-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics