Analysis and Improvement on a Mobile Payment Protocol with Outsourced Verification in Cloud Service

被引:1
作者
KANG Baoyuan
DU Jianqi
SI Lin
XIE Mingming
机构
[1] SchoolofComputerScienceandTechnology,TianjinPolytechnicUniversity
关键词
mobile payment; cloud service; digital signature; security; bilinear map;
D O I
暂无
中图分类号
TP309 [安全保密]; F724.6 [电子贸易、网上贸易]; F832.2 [银行制度与业务];
学科分类号
081201 ; 0839 ; 1402 ; 1201 ; 020204 ;
摘要
Mobile wallet is a very convenient means of mobile payment to allow the clients to conduct the payment via their mobile devices. To reduce the computation burden of resources-constraint mobile devices, a few mobile wallet protocols with outsourced verification in cloud computing were proposed. But in some of the protocols, there exist the risk of a colluding attack of the customer and the untrusted cloud server. In this paper, we propose an improved protocol, in which the payment information is protected by Hash function and random number. The malicious customer and cloud server cannot change the payment information to conduct a collusion forgery attack to defraud the merchant. The security analysis indicates that the proposed improved protocol can enhance the security in terms of correctness, unforgeability and traceability without increasing the computational burden.
引用
收藏
页码:223 / 228
页数:6
相关论文
共 8 条
[1]   可证安全的高效无证书聚合签名方案 [J].
曹素珍 ;
郎晓丽 ;
刘祥震 ;
王斐 .
信息网络安全, 2019, (01) :42-50
[2]   基于双线性对的无证书群签名方案研究 [J].
陈亚萌 ;
程相国 ;
王硕 ;
高明 .
信息网络安全, 2017, (03) :53-58
[3]  
Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement[J] . Yongjian Liao,Yichuan He,Fagen Li,Shijie Zhou. Computer Standards & Interfaces . 2018
[4]  
Next generation cloud computing: New trends and research directions[J] . Blesson Varghese,Rajkumar Buyya. Future Generation Computer Systems . 2018
[5]  
Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage[J] . Baoyuan Kang,Jiaqiang Wang,Dongyang Shao,Emilio Insfran. Mathematical Problems in Engineering . 2017
[6]  
Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks[J] . Baoyuan Kang,Jiaqiang Wang,Dongyang Shao,Stefania Sardellitti. Mobile Information Systems . 2017
[7]  
A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing[J] . Zhen Qin,Jianfei Sun,Abubaker Wahaballa,Wentao Zheng,Hu Xiong,Zhiguang Qin. Computer Standards & Interfaces . 2016
[8]  
Building a Research Model for Mobile Wallet Consumer Adoption: The Case of Mobile Suica in Japan[J] . Amoroso,Donald L,Magnier-Watanabe,Rémy. EN . 2012 (1)