FORCE Fully Off-line secuRe CrEdits for Mobile Micro Payments

被引:0
作者
Daza, Vanesa [1 ]
Di Pietro, Roberto [2 ]
Lombardi, Flavio [2 ]
Signorini, Matteo [1 ]
机构
[1] Univ Pompeu Fabra, Dept Informat & Commun Technol, Barcelona, Spain
[2] Roma Tre Univ, Dept Math & Phys, Rome, Italy
来源
2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT) | 2014年
关键词
Security; Payment; Protocol; Off-line; KEYS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Payment schemes based on mobile devices are expected to supersede traditional electronic payment approaches in the next few years. However, current solutions are limited in that protocols require at least one of the two parties to be on-line, i.e. connected either to a trusted third party or to a shared database. Indeed, in cases where customer and vendor are persistently or intermittently disconnected from the network, any on-line payment is not possible. This paper introduces FORCE, a novel mobile micro payment approach where all involved parties can be fully off-line. Our solution improves over state-of-the-art approaches in terms of payment flexibility and security. In fact, FORCE relies solely on local data to perform the requested operations. Present paper describes FORCE architecture, components and protocols. Further, a thorough analysis of its functional and security properties is provided showing its effectiveness and viability.
引用
收藏
页码:125 / 136
页数:12
相关论文
共 30 条
  • [1] A system of secure virtual coupons using NFC technology
    Aigner, Manfred
    Dominikus, Sandra
    Feldhofer, Martin
    [J]. FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 362 - +
  • [2] Secure pay while on move toll collection using VANET
    Chaurasia, Brijesh Kumar
    Verma, Shekhar
    [J]. COMPUTER STANDARDS & INTERFACES, 2014, 36 (02) : 403 - 411
  • [3] Cheng W, 2010, INT CONF COMP SCI, P441, DOI [10.1109/ICCSIT.2010.5563965, 10.1109/PIC.2010.5687587]
  • [4] Choi P, 2012, IEEE INT SYMP CIRC S, P1787
  • [5] Cong Wang, 2013, 2013 Fifth International Conference on Computational and Information Sciences (ICCIS 2013), P438, DOI 10.1109/ICCIS.2013.122
  • [6] Coskun V., 2012, NEAR FIELD COMMUNICA
  • [7] Dai X, 2006, SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, P197
  • [8] Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    Dodis, Yevgeniy
    Ostrovsky, Rafail
    Reyzin, Leonid
    Smith, Adam
    [J]. SIAM JOURNAL ON COMPUTING, 2008, 38 (01) : 97 - 139
  • [9] Dominikus S, 2007, 21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, P421
  • [10] The technology of identification and authentication of financial transactions. From smart cards to NFC-terminals
    Golovashych, Sergiy
    [J]. 2005 IEEE INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2005, : 407 - 412