Browse > Article
http://dx.doi.org/10.9728/dcs.2013.14.1.81

Secure Mobile Credit Card Payment Protocol based on Certificateless Signcryption  

Choi, Hui-Jin (고려대학교 정보보호대학원 정보보호학과)
Kim, Hyung-Jung (고려대학교 정보보호대학원 정보보호학과)
Publication Information
Journal of Digital Contents Society / v.14, no.1, 2013 , pp. 81-88 More about this Journal
Abstract
The increase of the smartphone users has popularized the mobile payment and the mobile credit card users are rapidly getting increased. The mobile credit cards that currently used provide its users with the service through downloading mobile credit card information into USIM. The mobile credit card saved in USIM has the minimized information for the security and is based on PKI. However certificate-based payment system has a complicated procedure and costs a lot of money to manage the certificates and CRL(Certificate Revocation List). Furthermore, It can be a obstacle to develop local e-commerce in Korea because it is hard for foreigners to use them. We propose the secure and efficient mobile credit card payment protocol based on certificateless signcryption which solve the problem of certificate use.
Keywords
Mobile Credit Card; Certificateless; Payment Protocol; Signcryption;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 http://www.gartner.com/it/page.jsp?id=208315, "Worldwide Mobile Payment Transaction calue to Surpass $171.5 Billion"
2 A. Shamir. "Identity-based crypto systems and signature schemes." In Advances in Cryptology, volume196 of LNCS, pages 47-53. Springer-Verlag, 1985
3 S. Fourati, "Protocol specification core functions ofVisa International 3-D security protocol, " Wireless Communications, Issue 7, pp.353-360, 2002.
4 Sang-Kyu Byun "Analysis for the Smart Phone Ecosystem and its Economic Spillover Effects" Journal of Digital Contents Society Vol.12, pp.205-216, 2011.   과학기술학회마을   DOI   ScienceOn
5 W. Xie and Z. Zhang. "Certificateless Signcryption without Pairing." Cryptology ePrint Archive : Report2010/187, Available from : http://eprint.iacr.org/2010/187
6 Kenneth G. Paterson "A comparison between traditional public key infrastructures and Identity-based Cryptography" Information Security Technical Report Volume 8, Issue 3, pp. 57-72, July 2003,   DOI   ScienceOn
7 M. Barbosa and P.Farshim "Certificateless signcryption" Cryptology eprint archive : report 2008/143. Available from : http://eprint.iacr.org/2008/143.
8 C. Wu and Z. Chen. "A new efficient certificateless signcryption scheme." In International Symposium on Information Science and Engineering, ISISE'8., volume 1, pages 661-64, 2008.
9 S.S.D. Selvi, S.S. Vivek, and C.P. Ragan. "On thesecurity of certificateless signcryption schemes." Cryptology ePrint Archive : Report 2009/298, Available from : http://eprint.iacr.org/2009/298.
10 W. Xie and Z. Zhang. "Efficient and provably-securecertificateless signcryption from bilinear maps." Cryptology ePrint Archive : Report 2009/578, Available from : http://eprint.iacr.org/2009/578.
11 Eun wha Jhee, Ae young Kim, Sang ho Lee "Improving the Security of Mobile Credit Card Payment Protocol for USIM-based Smart Phone" Journal of Computing Science and Engineering, 17(4), April 2011.   과학기술학회마을
12 S. Kungpisdan, B. Srinivasan and P. Le, "A secure account-based mobile payment protocol, " Proc. of ITCC 2004, vol.1, pp.35-39, 2004.
13 X. Wu, O. Dandash and P. Le, "The design and implementation of a smartphone payment system based on limited-used key generation scheme, "Third International Conference on Information Technology : New Generations, pp.458-463, 2006.
14 X. Wang and N. Cui, "Research of security mobilepayment protocol in communication restrictions scenarios, " Computational Intelligence and Security, pp.213-217, 2009.