An on-line electronic check system with mutual authentication

نویسندگان

  • Chin-Chen Chang
  • Shih-Chang Chang
  • Jung-San Lee
چکیده

In recent years, electronic check (echeck) has been more and more popular on the electronic commerce application. For this reason, there were many scholars have proposed the security issues for related echeck. Chang et al. present their views on echeck to improve the past scheme. Chang et al.’s scheme achieves the security of system and provides mutual authentication between payer and payee. However, there still has nonanonymity, time synchronous and too large computing issues in their scheme. We therefore propose an improving scheme to avoid these defects. Keywords— electronic check, electronic commerce, mutual authentication, nonanonymity, time synchronous

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Research on an Authentication Algorithm for an Electronic Attendance System in the Constructing of a Smart Campus

This paper presents a proposal for a large-scale lecture authentication algorithm for an electronic attendance system. The utilization rate for existing electronic attendance systems is low. Because it couldn't solve the problems that occur by special conditions of university such as vicarious attendance, bottlenecking during attendance check-in, and attendees departure at intermission. The mos...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

A Novel Authentication Protocol suitable to EPC Class 1 Generation 2 RFID system

RFID, capable of non-contact automatic identification using the small, low-cost RFID tags, is taking the place of barcodes to become electronic tags of the new generation. EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the identity of tag (TID) is delivered in plaintext which makes insecurity. Several solutions have been propose...

متن کامل

New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme

In 2005, Lee, Kim, and Yoo proposed a nonce-based mutual authentication scheme using smart cards. However, this paper demonstrates that Lee-Kim-Yoo’s scheme is vulnerable to an impersonation attack that the attacker without knowing the remote user’s any secret can masquerade as him by obtaining the valid authentication message from any normal session between the remote user and the system. Our ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Electrical Engineering

دوره 35  شماره 

صفحات  -

تاریخ انتشار 2009