Browse > Article

A Secure Micro-Payment Protocol based on Credit Card in Wireless Internet  

Kim Seok mai (충북대학교 컴퓨터과학과)
Kim Jang Hwan (대덕대 IT계열)
Lee Chung sei (대덕대 컴퓨터과학과)
Abstract
Recently, there are rapid development of information and communication and rapid growth of e-business users. Therefore we try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which conned wire and wireless communication. certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil Paring. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol solves the privacy protection and Non-repudiation p개blem. We solve not only the safety and efficiency problem but also independent of specific wireless platform. The protocol requires the certification organization attent the certification process of payment. Therefore, other domain provide also receive an efficient and safe service.
Keywords
mobile; ID based Public Key Cryptosystem; electronic Payment; end-to-end security; certificate;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Dan Bonehy Matthew Franklin, 'Identity-based encryption from the Weil Pairing', extended abstract in Advances in Cryptology-Crypto 2001, Lecture Notes in Computer Science, Vol.2139, Sprmger-Verlag, pp. 231-229, Aug. 2001
2 Dan Boneh, Ben Lynn, Hovav Shacham, 'Short signatures from the Weil pairing', in Advances in Cryptology-AsiaCrypt 2001, Lecture Notes in Computer Science, Vol. 2248, Springer-Verlag, pp. 514-532, 2001   DOI   ScienceOn
3 Jae Choon Cha and Jung Hee Cheon, An identity-based signature from gap Diffie-Hellman groups, PKC 2003, Lecture Notes in Computer Science 2567 (2002), pp.18-30   DOI
4 Jeyanthi Hall, Susan Kilbank, Michel Barbeau and Evangelos Kranakis, 'WPP: A Secure Payment Protocol for Supporting Credit-card and Debit-card Transactions Over Wireless Networks,' IEEE International Conference on Teleconununications (ICT), Bucharest, June, 2001
5 Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, 'Handbook of Applied Cryptography' CRC Press, October 16, 1996, ISBN: 0849385237
6 Pekka Niskanen and Jukka Heika 'Inside WAP : Programming Applications with WML and WMLScript'Addison-Wesley, 2000
7 이상곤, 윤태은 'EC - KCDSA 부분 은닉서명을 이용한 거스름 재사용 가능한 전지수표지불시스템' 한국정보보호학회논문지 제13권 제1호, 2003. 2
8 조유근, 'SET 프로토콜을 위한 안전하고 효율적인 지불 게이트웨이의 설계 및 구현', 서울대학교 석사논문, 2000년 2월
9 이병래, 장경아, 김태윤 '3세대 이동통신을 위한 티켓 기반 인증 및 지불 기법' 정보과학회논문지: 정보통신 제29권 제4호, 2002.8
10 Nigel P. Smart, 'An Identity based authenticated Key Agreement Protocol based on the Weil pairing', Cryptology ePrint Archive, Report 2001/111,2001. http://eprint.iacr.org/
11 이동훈, 임채훈, 'TLS와 WTLS의 비교 분석', (주)퓨처시스템 암호체계센터 기술보고서, Oct.2000
12 Keith M. Martin , Bart Preneel , Chris J Mitchell , Hans-Joachim Hitz , $G\ddot unther$ Horn, A. Poliakova , P. Howard, 'Secure Billing for Mobile Information Services in UMTS', Proceedings of the 5th International Conference on Intelligence and Services in Networks:Technology for Ubiquitous Telecom Services, p.535-548, May 25-28, 1998
13 Divya Nalla, and K.C.Reddy, 'ID-based tripartite Authenticated Key Agreement Protocols from pairings' available at http://eprint.iacr.org/2003/004.pdf
14 Tatsuaki Okamoto and David Pointcheval 'The gap-problems: a new class of problems for the security of cryptographic Schemes, Proc. of PKC '01, Lecture Nores in Computer Sciences,Vol. 1992, pp. 104-118, Springer-Verlag, 2001   DOI   ScienceOn
15 Dan Boneh, 'The decision Diffie-Hellman problem', in Proc. Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science, Vol. 1423, Springer-Verlag, pp. 48-63, 1998   DOI   ScienceOn
16 Whitfield Diffie and Martin E. Hellman, 'New Directions in Cryptography' IEEE Transactions on Informations Theory, Vol, IT-22, No 6, pp.472-492, Nov,1976
17 이만영, 김지홍, 류재철, 송유진, 염흥렬, 이임영, '전자상거래 보안 기술', 생능출판사, 1999
18 Adi Shamir 'Identity based cryptosystems and signature schemes' Advances in Cryptology Proceedings of Crypto'84, pp.47-57
19 Gunter Horn, Bart Preneel, 'Authentication and Payment in Future Mobile Systems,' ESORICS, LNCS 1485,pp.277-293, 1998   DOI   ScienceOn
20 Tim Dierks and Christopher Allen, 'The TLS Protocol Version 1.0' IETF RFC 2246, January 1999
21 한대완, 이동훈, 황상철, 류재철 'WISA2002에 제안된 무선 전자 지불 시스템의 안전성' 정보보호학회 논문지 13권 6호 2003.12
22 WAP Fourm, 'Wireless Application Protocol Wireless Transport Layer Security Spectification version 18-FEB-2000', 2000