Public Key Cryptography for Mobile Payment
2010, Ubiquitous Computing and Communication Journal
Abstract
Since the mobile systems are growing quickly, the e-commerce will change gently to m-commerce. As a result, mobile security will become the one of the most important part of mobile system and will become the hottest area facing the mobile payment due to mobile networks directness. However, the appropriate encryption scheme for mobile communication must have small amount of data calculating and quick operation as of its inherent restrictions of small quantity and low calculating ability. The objectives of this paper are to look at mobile payment and its security. Also, to explain elliptic curve with public key encryption, authentication of security wireless milieu. Compare with the RSA scheme, an elliptic curve has shorter key size, smaller signature length, low calculating, fast operations and high security working.
FAQs
AI
What challenges does mobile payment face in ensuring security?
The paper identifies mobile security as a critical challenge for mobile payment, particularly regarding protecting sensitive transaction data and ensuring user confidentiality. It emphasizes the necessity for secure wireless payment schemes to address transaction disputes effectively.
How does elliptic curve cryptography improve mobile payment transactions?
Elliptic curve cryptography, introduced in 1985, provides significant computational advantages with smaller key sizes compared to RSA, enabling faster transactions. Its efficiency makes it suitable for the demands of wireless secure communication in mobile payment schemes.
What role does the time stamping server (TSS) play in mobile payments?
The time stamping server (TSS) offers notarization from a neutral perspective, enhancing transaction integrity in the event of disputes. This mechanism is integrated within the mobile payment scheme to ensure accountability and reliability.
How does public key encryption enhance key management in mobile payment systems?
Public key encryption simplifies key management by allowing secure key transmission without the need for a shared secret. The RSA scheme, developed in 1978, exemplifies this advantage by being provably secure against chosen message attacks.
What are the advantages of using digital signatures in mobile payments?
Digital signatures ensure authenticity, integrity, and nonrepudiation of transactions, which are critical for secure mobile payments. Utilizing elliptic curve cryptography, they provide a robust mechanism for proving participant identity without physical communication.
References (8)
- Nambiar, S., and Liang, L., IEEE IRI, 8-10, 475-480, November 2004.
- L. Antovski, and M. Gusev, "M-Payments", Proceedings of the 25 th International Conference Information Technology Interfaces, 2003 (ITI'03).
- S. Nambiar, and T.L. Chang, "M-Payment Solutions and M-Commerce Fraud
- X. Zheng, and D. Chen, "Study of Mobile Payments System", Proceedings of the IEEE International Conference on E-Commerce, 2003 (CEC'03).
- S. Kungpisdan, B. Srivnivasan, and P.D. Le, "A Secure Account-Based Mobile Payment Protocol", Proceedings of the International Conference on Information Technology: Coding and Computing, 2004 (ITCC'04).
- A. Fourati, H.K.B. Ayed, F. Kamoun, and A. Benzekri, "A SET Based Approach to Secure the Payment in Mobile Commerce", In Proceedings of 27th Annual IEEE Conference on Local Computer Networks (LCN'02), November 06 -08, 2002, Tampa, Florida
- Jerry Gao, Krishnaveni Edunuru, Jacky Cai, and Simon Shim, "P2P-Paid: A Peer-to-Peer Wireless Payment System" Proceedings of the 2005 Second IEEE International Workshop on Mobile Commerce and Services (WMCS'05).
- ZHAO Lianggang, CHEN Kefei, "Application of Elliptic Curve Cryptosystem for Security Protocol of Wireless Communication", Computer Engineering, Volume 28 No.3, 2002, pp 128-129, shanghai, China. Special Issue of Ubiquitous Computing Security Systems UbiCC Journal -Volume 5 www.ubicc.org