Design of electronic payment system based on authenticated key exchange

被引:0
作者
Susmita Mandal
Sujata Mohanty
Banshidhar Majhi
机构
[1] National Institute of Technology Rourkela,Department of Computer Science and Engineering
来源
Electronic Commerce Research | 2018年 / 18卷
关键词
Anonymity revocation; E-payment; Mutual authentication; AVISPA tool;
D O I
暂无
中图分类号
学科分类号
摘要
This paper proposes an electronic payment system based on authenticated key exchange protocol. In this scheme, an effective owner tracing mechanism is introduced to identify a malicious customer. Moreover, every participant can mutually authenticate each other. The security of the scheme is mainly based on the hardness assumption of computational Diffie–Hellman and discrete logarithm problems. Furthermore, the security of our scheme is simulated in the automated validation of Internet security protocols and applications tool and proved that the scheme is secure against replay and man-in-the-middle attacks.
引用
收藏
页码:359 / 388
页数:29
相关论文
共 35 条
  • [1] Chou J-S(2009)A novel id-based electronic cash system from pairings IACR Cryptology ePrint Archive 2009 339-682
  • [2] Chen Y(2011)A novel electronic cash system with trustee-based anonymity revocation from pairing Electronic Commerce Research and Applications 10 673-765
  • [3] Cho M-H(2012)An anonymous secure payment protocol in a payment gateway centric model Procedia Computer Science 10 758-2713
  • [4] Sun H-M(2008)A secure mobile electronic payment architecture platform for wireless mobile networks Wireless Communications, IEEE Transactions on 7 2705-99
  • [5] Chen Y(2012)A low computational-cost electronic payment scheme for mobile commerce with large-scale mobile users Wireless Personal Communications 63 83-66
  • [6] Chou J-S(2011)A new untraceable off-line electronic cash system Electronic Commerce Research and Applications 10 59-287
  • [7] Sun H-M(2011)A fair online payment system for digital content via subliminal channel Electronic Commerce Research and Applications 10 279-362
  • [8] Cho M-H(2015)On the existence of subliminal channel in instant messaging systems International Journal of Security and Its Applications 9 353-324
  • [9] Isaac JT(2013)An efficient authenticated encryption scheme based on ecc and its application for electronic payment Information Technology and Control 42 315-10
  • [10] Zeadally S(1987)Efficient and timely mutual authentication ACM SIGOPS Operating Systems Review 21 8-86