Mobile Payment Method Based on Public-Key Cryptography
نویسندگان
چکیده
منابع مشابه
Mobile Paymentmethodbased on Public-key Cryptography
Mobile payment is defined as mobile money, which is considered as an attractive alternative for cash, cheque, or credit. In this paper we propose a new secure mobile paymentmethod. This method is summarized in three processes: firstly, the authentication process, which involves the authentication phases for the applied customers. Secondly, the member recognition process which tests and ensures ...
متن کاملA Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
The way people do the business and transactions are changing drastically with the advent of Information Technology. The customer wants to access information, goods and services any time and in any place on his mobile device. Receiving financial data, trade on stock exchanges, accessing balances, paying bills and transfer funds using SMS are done through mobile phones. Due to involvement of valu...
متن کاملRFID Privacy Based on Public-Key Cryptography
RFID systems makes it possible for a server to identify known tags in wireless settings. As they become more and more pervasive, people privacy is more and more threatened. In this talk, we list a few models for privacy in RFID and compare them. We review a few protocols. We further show that strong privacy mandates the use of public-key cryptography. Finally, we present a new cryptosystem whic...
متن کاملPublic Key Cryptography based on Semigroup Actions
A generalization of the original Diffie-Hellman key exchange in (Z/pZ) found a new depth when Miller [27] and Koblitz [16] suggested that such a protocol could be used with the group over an elliptic curve. In this paper, we propose a further vast generalization where abelian semigroups act on finite sets. We define a Diffie-Hellman key exchange in this setting and we illustrate how to build in...
متن کاملPublic-Key Cryptography Based on Modular Lattices
We present an approach to generalization of practical Identity-Based Encryption scheme of [BF01]. In particular we show how the protocol could be used on finite modular lattices and as a special case on vector spaces over finite field. The original proof of security for this protocol does not hold in this general algebraic structure, thus this is still a work in progress.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of Computer Networks & Communications
سال: 2015
ISSN: 0975-2293,0974-9322
DOI: 10.5121/ijcnc.2015.7207