An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment

被引:19
作者
Yang, Jen-Ho [1 ]
Chang, Ya-Fen [2 ]
Chen, Yi-Hui [3 ]
机构
[1] Kainan Univ, Dept Multimedia & Mobile Commerce, Tao Yuan 33857, Taoyuan County, Taiwan
[2] Natl Taichung Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taichung 404, Taiwan
[3] Asia Univ, Dept Appl Informat & Multimedia, Taichung 41354, Taiwan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2013年 / 42卷 / 04期
关键词
Authenticated encryption; elliptic curve; electronic payment; digital signature; electronic commerce; SIGNCRYPTION;
D O I
10.5755/j01.itc.42.4.2150
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an efficient authenticated encryption scheme based on elliptic curve cryptography. The proposed scheme does not need to construct any digital signature, so the computation costs can be greatly reduced. In addition, we also use the proposed authenticated encryption scheme to design a secure electronic payment system. The proposed electronic payment system provides the security requirements of confidentiality, authenticity, integrity, privacy protection, and double-spending prevention. According to the results of this paper, the proposed authenticated encryption scheme can be easily implemented in mobile payment environments. Besides, it can be also applied to electronic auction, online meeting, and electronic voting.
引用
收藏
页码:315 / 324
页数:10
相关论文
共 23 条
[1]  
Chang C. C., 2005, INT J COMPUTER SCI N, V5, P119
[2]   Efficient on-line electronic checks [J].
Chen, WK .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) :1259-1263
[3]  
Hankerson D, 2004, Guide to Elliptic Curve Cryptography
[4]  
Hong JW, 2011, INF TECHNOL CONTROL, V40, P252, DOI 10.5755/j01.itc.40.3.634
[5]   A self-encryption mechanism for authentication of roaming and teleconference services [J].
Hwang, KF ;
Chang, CC .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2003, 2 (02) :400-407
[6]   A new mobile payment scheme for roaming services [J].
Hwang, Ren-Junn ;
Shiau, Sheng-Hua ;
Jan, Ding-Far .
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2007, 6 (02) :184-191
[7]   An efficient signcryption scheme with forward secrecy based on elliptic curve [J].
Hwang, RJ ;
Lai, CH ;
Su, FF .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) :870-881
[8]   Confidential deniable authentication using promised signcryption [J].
Hwang, Shin-Jia ;
Sung, Yun-Hao .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) :1652-1659
[9]   The Elliptic Curve Digital Signature Algorithm (ECDSA) [J].
Don Johnson ;
Alfred Menezes ;
Scott Vanstone .
International Journal of Information Security, 2001, 1 (1) :36-63
[10]  
Khalique A., 2010, Int. J. Comput. Appl, V2, P21, DOI [10.5120/631-876, DOI 10.5120/631-876]