Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Journal of Computer Security
Secure Transactions with Mobile Agents in Hostile Environments
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Speeding Up Secret Computations with Insecure Auxiliary Devices
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
On Verifiable Implicit Asking Protocols for RSA Computation
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
An Asymmetric Authentication Protocol for M-Commerce Applications
ISCC '03 Proceedings of the Eighth IEEE International Symposium on Computers and Communications
MPCS: a secure Mobile Payment Consortia System for higher educational institutions
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
A survey on mobile digital signature models
Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business
Hi-index | 0.00 |
A number of asymmetrical payment methods have been developed to enable mobile users to buy goods online by charging them to their mobile phone bills by their network operators. It has been recognized that these methods must be used in conjunction with the security services of authentication and non-repudiation of the origin of the request(s) sent from a mobile user so as to prevent fraudulent actions by the network operator or any other entities. This paper presents a novel joint-signature scheme that can be used as one of the security primitives to address the above security services. The scheme enables a mobile user to securely and efficiently instruct his/er network operator for m-payment related actions. It is based on the use of the one-way hash function and traditional digital signature method, but in a collaborative manner with the network operator. The joint-signature scheme achieves the same security services as those by a traditional digital signature scheme, i.e. message origin authentication, message integrity and non-repudiation of origin, but offers lower computational cost for the mobile user. In addition, it imposes lower communication cost in comparison with proxy/server-aided signature schemes.