期刊文献+

一种适用于移动环境的公平移动支付协议 被引量:3

A Novel Fair Mobile Payment Protocol Applicable to Mobile Environment
在线阅读 下载PDF
导出
摘要 针对移动环境中网络及计算条件受限的情况,在考虑有效性和支付效率的基础上,设计了一个适应于移动环境的公平移动支付协议。该协议由认证、支付、恢复、结算四个子协议构成。在认证协议中通过基于Hash函数的动态ID机制满足了双向认证、有限的匿名性和不可追踪性,并获取不可伪造性的、可重用的支付证书。在支付过程中基于变色龙Hash函数和双Hash链,实现了交易的匿名性、可追究性和公平性。最后利用Kailar逻辑对协议的可追究性和公平性进行形式化分析,结果表明:协议在保持较高执行效率的同时,能满足可追究性和公平性,适用于在移动环境以及类似的通信、计算条件受限的环境中使用。 Considering the conditions that the network and calculation capability of mobile terminals are limited in the mobile environment, the novel fair mobile payment protocol was proposed. The protocol was composed of four sub-protocols of authentication, payment, recovery and withdraw. In the authentication sub-protocol, the dynamic ID mechanism based on the hash function was adopted to satisfy mutual authentication, limited an- onymity and intractability. Simultaneously, the unforgeable and reusable payment certificate was obtained. In the process of payment, the attributes of anonymity, non-repudiation and fairness were achieved on the basis of the Chameleon Hash functions and double Hash chains. Finally, through formally analyzing the security attrib- utes by the Kailar logic, the result declares that the protocol can fulfill non-repudiation and fairness while main- taining high efficiency in implementation. The protoeol can be applied in mobile environments and similar com- munication and calculation constrained environments.
出处 《铁道学报》 EI CAS CSCD 北大核心 2013年第11期51-59,共9页 Journal of the China Railway Society
基金 国家自然科学基金(61240025) 四川省教育厅基金(13ZB0152)
关键词 移动支付 HASH链 变色龙Hash函数 公平性 KAILAR逻辑 mobile payment Hash chain chameleon Hash functions fairness Kailar logic
  • 相关文献

参考文献22

  • 1RIVEST R L,SHAMIR A.Pay Word and Micro Mint:Two Simple Micropayment Schemes[C]//Proceedings of International Workshop on Security Protocols.Berlin:Springer-verlag,1997:69-87.
  • 2HAO J,ZOU J,DAI Y.A Real-time Payment Scheme for SIP Service Based on Hash Chain[C]//Proceedings of IEEE International Conference on e-Business Engineering (ICEBE'08).New York:IEEE Prees,2008:279-286.
  • 3ESMAEELI A,SHAJARI M.Mvpayword:Secure and Efficient Payword-based Micropayment Scheme[C]//Proceedings of IEEE 2ed International Conference on Applications of Digital Information and Web Technologies (ICADIWT'09).New York:IEEE Prees,2009:609-614.
  • 4ZHAO X,LV Y,HE W.A Novel Micropayment Scheme with Complete Anonymity[C]//Proceedingsof 5th International Conference on Information Assurance and Security (IAS'092009).New York:IEEE Prees,2009:638-642.
  • 5BUTTYAN L.Removing the Financial Incentive to Cheat In Micropayment Schemes[J].Electronics Letters,2000,36(2):132-133.
  • 6樊利民,廖建新.公平的移动小额支付协议[J].电子与信息学报,2007,29(11):2599-2602. 被引量:9
  • 7姜楠,杨日璟,林正奎,刘向东.基于混沌双Hash链的移动微支付协议[J].吉林大学学报(工学版),2010,40(2):581-585. 被引量:3
  • 8李方伟,闫少军,万丽.一种新型的电子商务微支付方案[J].重庆邮电大学学报(自然科学版),2011,23(5):612-615. 被引量:2
  • 9LUO D,ZHANG J.Efficient Self-fair Exchange Anonymous E-payment Protocol[J].Journal of Computational Information Systems,2011,7(4):1302-1309.
  • 10LAN T.Secure Mechanism Based on Concurrent Signature for Mobile Payment Services[C]//Proceedings of IEEE 3rd International Conference on Communication Software and Networks(ICCSN'2011).New York:IEEE Prees,2011:435-438.

二级参考文献42

  • 1郑炜.MISC平台的架构与基本功能[J].中国数据通信,2004,6(8):19-21. 被引量:1
  • 2卿斯汉,李改成.公平交换协议的一个形式化模型[J].中国科学(E辑),2005,35(2):161-172. 被引量:9
  • 3万仁福,李方伟,朱江.一种适用于移动环境的认证和支付协议[J].电子与信息学报,2005,27(3):498-501. 被引量:7
  • 4Mahil Carr. Mobile payment systems and services:an introduction [EB/OL]. [2008-04-18] http:// mpf. org. in/Mobile Payment Systems and Services. pdf.
  • 5Rivest R, Shamir A. Payword and micromint: two simple micropayment schemes [J]. CryptoBytes, 1997,2(1) :7 -11.
  • 6Buttyan L. Removing the financial incentive to cheat in micropayment schemes[J]. IEEE Letters, 2000, 26(2) :132-133.
  • 7Lamport L. Password authentication with insecure communication[J]. Communications of the ACM, 1981, 24 (11): 770-772.
  • 8Wang X Y, Yu H B. How to Break MD5 and Other Hash Functions[M]. Berlin, Heidelberg: SpringerVerlag, 2005.
  • 9Wang X Y, Lai X J, Feng D G,et al. Cryptanalysis of the Hash functions MD4 and ripemd[C]//Advances in Cryptology-Eurocrypt 2005. Berlin:Springer, 2005.
  • 10Matthews R. On the derivation of a 'chaotic' encryption algorithm[J]. Cryptologia, 1989,3 (1) : 29- 42.

共引文献41

同被引文献38

  • 1孙玲芳,许金波,朱芸.基于可信第三方的安全支付协议的设计与分析[J].计算机应用,2006,26(12):2910-2912. 被引量:4
  • 2范伟,寇卫东,李华平,党岚君,樊凯.一种公平的移动支付协议[J].计算机工程与应用,2007,43(11):201-203. 被引量:3
  • 3王常吉,汤庸,李琴.ID-Based Fair Off-Line Electronic Cash System with Multiple Banks[J].Journal of Computer Science & Technology,2007,22(3):487-493. 被引量:2
  • 4KapilRaina AnuragHarsh 战晓苏 苏忠译.移动商务安全实用指南[M].北京:清华大学出版社,2003..
  • 5Meadows C,Syverson P.A formal specification of requirements for payment transactions in the SET protocol[C]//Proceeding of Financial Cryptography Conference,Berlin Heidelberg,Springer press,1998:122-140.
  • 6Fuwyi Yang,Zhenwei Liu,Suhui Chiu.Mobile Banking Payment System[J].Journal of Wireless Mobile Networks,2011,3(2):85-95.
  • 7Jesús Téllez Isaac,Sherali Zeadally,JoséSierra Cámara.A lightweight secure mobile Payment protocol for vehicular ad-hoc networks[J].Journal of Electronic Commerce Research,2012,12(1):97-123.
  • 8Ying Sun,Jiwen Chai,Huihui Liang,et al.A Secure and Efficient ECheque Protocol from Chameleon Hash Function[C]//Intelligent Networking and Collaborative Systems(INCoS),2013 5th International Conference on IEEE,2013:470-475.
  • 9Sekhar V C,Sarvabhatla M.Secure lightweight mobile payment protocol using symmetric key techniques[C]//Computer Communication and Informatics(ICCCI),2012 International Conference on,IEEE,2012:1-6.
  • 10Crowe M,Tavilla E.Mobile Phone Technology:“Smarter”Than We Thought[J].Federal Reserve Bank of Boston,2012:136-149.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部