Application study on public key cryptography in mobile payment

With mobile terminal increase, E-Commerce is transforming to M-Commerce. However, mobile security is one of the most urgent, and complex challenges to mobile payment because of mobile networks openness. The suitable cryptosystem of mobile communication equipment should possesses small amount of data calculating and rapid operation velocity because of its inherent limitations of small volume, low calculating capability. The purpose of this paper is to explore mobile payment and security. The paper discribes an elliptic curve methods in enciphering / deciphering, authentication of security wireless environment. Compare to traditional RSA cryptosystem, an elliptic curve has shorter key lengths, shorter signature size, low calculating, rapid velocity and high security in use. In the final sections we briefly discuss quantum protocol.

[1]  Chang-Tien Lu,et al.  M-Payment Solutions and M-Commerce Fraud Management , 2008 .

[2]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[3]  Kefei Chen,et al.  Electronic Payment in Mobile Environment , 2002, DEXA Workshops.

[4]  Zhao Lianggang Application of Elliptic Curve Cryptosystem for Security Protocol of Wireless Communication , 2002 .

[5]  Bala Srinivasan,et al.  A secure account-based mobile payment protocol , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[6]  L. Antovski,et al.  M-payments , 2003, Proceedings of the 25th International Conference on Information Technology Interfaces, 2003. ITI 2003..

[7]  J. Gao,et al.  P2P-Paid: A Peer-to-Peer Wireless Payment System , 2005, Second IEEE International Workshop on Mobile Commerce and Services.

[8]  Key Pousttchi,et al.  Current mobile payment procedures on the German market from the view of customer requirements , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[9]  Yi-Bing Lin,et al.  Mobile prepaid phone services , 2000, IEEE Wirel. Commun..

[10]  Deren Chen,et al.  Study of mobile payments system , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[11]  Farouk Kamoun,et al.  A SET based approach to secure the payment in mobile commerce , 2002, 27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN 2002..

[12]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[13]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .