Password authentication with insecure communication
Communications of the ACM
Performance analysis of elliptic curve cryptography for SSL
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Mobile Payments - State of the Art and Open Problems
WELCOM '01 Proceedings of the Second International Workshop on Electronic Commerce
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Selecting Cryptographic Key Sizes
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Performance Analysis of Cryptographic Protocols on Handheld Devices
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
P2P-Paid: A Peer-to-Peer Wireless Payment System
WMCS '05 Proceedings of the Second IEEE International Workshop on Mobile Commerce and Services
An open, PKI-based mobile payment system
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
A MEP (mobile electronic payment) and IntCA protocol design
HPCC'05 Proceedings of the First international conference on High Performance Computing and Communications
Hi-index | 0.00 |
PKI can improve security of mobile payments but its complexity has made difficult its use in such environment. Certificate path validation is complex in PKI. This demands some storage and processing capacities to the verifier that can exceed the capabilities of mobile devices. In this paper, we propose TRUTHC to reduce computational cost of mobile payment authentication. TRUTHC replaces verification operations with hash operations. Results show a better reduction of the cost with ECDSA than with RSA