Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism

In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC) and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysis shows that the proposed scheme not only meets the high efficiency of mobile electronic payment premise, but also takes the security into account. The user confirmation mechanism at the end of the proposed scheme further strengthens the security of the proposed scheme. In brief, the proposed scheme is more efficient and practical than most of the existing schemes.

[1]  Tzong-Chen Wu,et al.  Efficient and secure three-party authenticated key exchange protocol for mobile environments , 2013, Journal of Zhejiang University SCIENCE C.

[2]  Kevin W. Sowerby,et al.  Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers , 2014, J. Comput. Syst. Sci..

[3]  Qiaoyan Wen,et al.  Certificateless Public Key Encryption Scheme with Hybrid Problems and Its Application to Internet of Things , 2014 .

[4]  Chin-Chen Chang,et al.  A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users , 2012, Wirel. Pers. Commun..

[5]  Yuguang Fang,et al.  A secure mobile electronic payment architecture platform for wireless mobile networks , 2008, IEEE Transactions on Wireless Communications.

[6]  Wang,et al.  MOTP: An Identity Authentication Scheme for M-Commerce , 2013 .

[7]  Chih-Ming Hsiao,et al.  A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients , 2013, Future Gener. Comput. Syst..

[8]  Xuelei Li,et al.  Cryptanalysis of a New Dynamic ID-based User Authentication Scheme to Resist Smart-Card-Theft Attack , 2014 .

[9]  Ashok Kumar Das,et al.  An Enhanced Access Control Scheme in Wireless Sensor Networks , 2014, Ad Hoc Sens. Wirel. Networks.

[10]  Ching Ying Lin,et al.  CNOT extraction attack on “quantum asymmetric cryptography with symmetric keys” , 2014 .

[11]  Norafida Ithnin,et al.  An Optimization of Tree Topology Based Parallel Cryptography , 2012 .

[12]  Woei-Jiunn Tsaur,et al.  Several security schemes constructed using ECC-based self-certified public key cryptosystems , 2005, Appl. Math. Comput..

[13]  Yixian Yang,et al.  Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol , 2012 .

[14]  Jenq-Shiou Leu,et al.  Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks , 2014, Wirel. Commun. Mob. Comput..

[15]  Wenjie Liu,et al.  Secure Quantum Private Comparison of Equality Based on Asymmetric W State , 2013, 1312.5577.

[16]  Hyoung-Kee Choi,et al.  An Enhanced Security Protocol for VANET-Based Entertainment Services , 2012, IEICE Trans. Commun..

[17]  Wenfen Liu,et al.  Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture , 2014, Wirel. Pers. Commun..

[18]  Jianhua Chen,et al.  An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments , 2011, IACR Cryptol. ePrint Arch..

[19]  Jen-Ho Yang,et al.  An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment , 2013, Inf. Technol. Control..

[20]  Morteza Nikooghadam,et al.  Secure Transmission of Mobile Agent in Dynamic Distributed Environments , 2013, Wirel. Pers. Commun..

[21]  G. Athisha,et al.  Reconfigurable Architecture for Elliptic Curve Cryptography Using FPGA , 2013 .

[22]  Yacine Ouzrout,et al.  The Reputation Evaluation Based on Optimized Hidden Markov Model in E-Commerce , 2013 .

[23]  Donghoon Lee,et al.  Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2014, Sensors.

[24]  Xiong Li,et al.  Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme , 2013 .

[25]  Chao Zhang,et al.  Novel frequency hopping sequences generator based on AES algorithm , 2010 .