메뉴 건너뛰기




Volumn 16, Issue 1, 2016, Pages 113-139

A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography

Author keywords

Authenticated encryption; Digital signature; E payment system; Elliptic curve cryptography; ProVerif; Signcryption

Indexed keywords

AUTHENTICATION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; ELECTRONIC MONEY; GEOMETRY; NETWORK SECURITY;

EID: 84958043300     PISSN: 13895753     EISSN: 15729362     Source Type: Journal    
DOI: 10.1007/s10660-015-9192-5     Document Type: Article
Times cited : (83)

References (39)
  • 1
    • 33746901950 scopus 로고    scopus 로고
    • Constraints on e-commerce in less developed countries: The case of china
    • Chen, S., & Ning, J. (2002). Constraints on e-commerce in less developed countries: The case of china. Electronic Commerce Research, 2(1–2), 31–42. doi:10.1023/A:1013331817147.
    • (2002) Electronic Commerce Research , vol.2 , Issue.1-2 , pp. 31-42
    • Chen, S.1    Ning, J.2
  • 2
    • 84874241654 scopus 로고    scopus 로고
    • Cybercrime and cyber-security issues associated with china: some economic and institutional considerations
    • Kshetri, N. (2013). Cybercrime and cyber-security issues associated with china: some economic and institutional considerations. Electronic Commerce Research, 13(1), 41–69. doi:10.1007/s10660-013-9105-4.
    • (2013) Electronic Commerce Research , vol.13 , Issue.1 , pp. 41-69
    • Kshetri, N.1
  • 3
    • 84925491135 scopus 로고    scopus 로고
    • Bulapay: A novel web service based third-party payment system for e-commerce
    • Huang, X., Dai, X., & Liang, W. (2014). Bulapay: A novel web service based third-party payment system for e-commerce. Electronic Commerce Research, 14(4), 611–633. doi:10.1007/s10660-014-9172-1.
    • (2014) Electronic Commerce Research , vol.14 , Issue.4 , pp. 611-633
    • Huang, X.1    Dai, X.2    Liang, W.3
  • 4
    • 85181646826 scopus 로고    scopus 로고
    • Chaum, D. (2013). Blind signatures for untraceable payments. In Advances in cryptology—CRYPTO ’86 Proceedings (pp. 199–203). Berlin: Springer
    • Chaum, D. (2013). Blind signatures for untraceable payments. In Advances in cryptology—CRYPTO ’86 Proceedings (pp. 199–203). Berlin: Springer.
  • 5
    • 84958062532 scopus 로고    scopus 로고
    • Group blind digital signatures: A scalable solution to electronic cash
    • Goldschlag DM, Stubblebine SG, (eds), Springer, Berlin
    • Lysyanskaya, A., & Ramzan, Z. (1998). Group blind digital signatures: A scalable solution to electronic cash. In D. M. Goldschlag & S. G. Stubblebine (Eds.), Financial cryptography (pp. 184–197). Berlin: Springer.
    • (1998) Financial cryptography , pp. 184-197
    • Lysyanskaya, A.1    Ramzan, Z.2
  • 6
    • 80053998094 scopus 로고    scopus 로고
    • Provably-secure electronic cash based on certificateless partially-blind signatures
    • Zhang, L., Zhang, F., Qin, B., & Liu, S. (2011). Provably-secure electronic cash based on certificateless partially-blind signatures. Electronic Commerce Research and Applications, 10(5), 545–552.
    • (2011) Electronic Commerce Research and Applications , vol.10 , Issue.5 , pp. 545-552
    • Zhang, L.1    Zhang, F.2    Qin, B.3    Liu, S.4
  • 7
    • 79960067346 scopus 로고    scopus 로고
    • An e-payment system based on quantum group signature
    • Xiaojun, W. (2010). An e-payment system based on quantum group signature. Physica Scripta, 82(6), 65403.
    • (2010) Physica Scripta , vol.82 , Issue.6 , pp. 065403
    • Xiaojun, W.1
  • 10
    • 84901592456 scopus 로고    scopus 로고
    • New and efficient conditional e-payment systems with transferability
    • Chen, X., Li, J., Ma, J., Lou, W., & Wong, D. S. (2014). New and efficient conditional e-payment systems with transferability. Future Generation Computer Systems, 37, 252–258.
    • (2014) Future Generation Computer Systems , vol.37 , pp. 252-258
    • Chen, X.1    Li, J.2    Ma, J.3    Lou, W.4    Wong, D.S.5
  • 11
    • 84890339524 scopus 로고    scopus 로고
    • An efficient authenticated encryption scheme based on ecc and its application for electronic payment
    • Yang, J.-H., Chang, Y.-F., & Chen, Y.-H. (2013). An efficient authenticated encryption scheme based on ecc and its application for electronic payment. Information Technology And Control, 42(4), 315–324.
    • (2013) Information Technology And Control , vol.42 , Issue.4 , pp. 315-324
    • Yang, J.-H.1    Chang, Y.-F.2    Chen, Y.-H.3
  • 12
    • 84905565168 scopus 로고    scopus 로고
    • A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks
    • Farash, M. S., & Attari, M. A. (2014). A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks. The Journal of Supercomputing, 69(1), 395–411.
    • (2014) The Journal of Supercomputing , vol.69 , Issue.1 , pp. 395-411
    • Farash, M.S.1    Attari, M.A.2
  • 13
    • 84904860928 scopus 로고    scopus 로고
    • A secure authentication scheme for session initiation protocol by using ecc on the basis of the tang and liu scheme
    • Irshad, A., Sher, M., Faisal, M. S., Ghani, A., Ul Hassan, M., & Ch, S. A. (2014). A secure authentication scheme for session initiation protocol by using ecc on the basis of the tang and liu scheme. Security and Communication Networks, 7(8), 1210–1218.
    • (2014) Security and Communication Networks , vol.7 , Issue.8 , pp. 1210-1218
    • Irshad, A.1    Sher, M.2    Faisal, M.S.3    Ghani, A.4    Ul Hassan, M.5    Ch, S.A.6
  • 14
    • 84929842561 scopus 로고    scopus 로고
    • A single round-trip sip authentication scheme for voice over internet protocol using smart card. Multimedia Tools and Applications
    • Irshad, A., Sher, M., Rehman, E., Ch, S. A., Ul Hassan, M., & Ghani, A. (2013). A single round-trip sip authentication scheme for voice over internet protocol using smart card. Multimedia Tools and Applications. doi:10.1007/s11042-013-1807-z.
    • (2013) doi:10.1007/s11042-013-1807-z
    • Irshad, A.1    Sher, M.2    Rehman, E.3    Ch, S.A.4    Ul Hassan, M.5    Ghani, A.6
  • 15
    • 84890424682 scopus 로고    scopus 로고
    • An enhanced authenticated key agreement for session initiation protocol
    • Farash, M. S., & Attari, M. A. (2013). An enhanced authenticated key agreement for session initiation protocol. Information Technology and Control, 42(4), 333–342.
    • (2013) Information Technology and Control , vol.42 , Issue.4 , pp. 333-342
    • Farash, M.S.1    Attari, M.A.2
  • 16
    • 84919877584 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an efficient mutual authentication rfid scheme based on elliptic curve cryptography
    • Farash, M. S. (2014). Cryptanalysis and improvement of an efficient mutual authentication rfid scheme based on elliptic curve cryptography. The Journal of Supercomputing, 70(1), 987–1001.
    • (2014) The Journal of Supercomputing , vol.70 , Issue.1 , pp. 987-1001
    • Farash, M.S.1
  • 17
    • 84978805810 scopus 로고    scopus 로고
    • An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards. International Journal of Communication Systems
    • Farash, M. S., & Attari, M. A. (2014). An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards. International Journal of Communication Systems. doi:10.1002/dac.2848.
    • (2014) doi:10.1002/dac.2848
    • Farash, M.S.1    Attari, M.A.2
  • 18
    • 84953364637 scopus 로고    scopus 로고
    • Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Networking and Applications
    • Farash, M. S. (2014). Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Networking and Applications. doi:10.1007/s12083-014-0315-x.
    • (2014) doi:10.1007/s12083-014-0315-x
    • Farash, M.S.1
  • 19
    • 84920868300 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks
    • Farash, M. S. (2015). Cryptanalysis and improvement of an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. International Journal of Network Management, 25(1), 31–51.
    • (2015) International Journal of Network Management , vol.25 , Issue.1 , pp. 31-51
    • Farash, M.S.1
  • 20
    • 84923012240 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a robust smart card secured authentication scheme on sip using elliptic curve cryptography. Multimedia Tools and Applications
    • Farash, M. S., Kumari, S., & Bakhtiari, M. (2015). Cryptanalysis and improvement of a robust smart card secured authentication scheme on sip using elliptic curve cryptography. Multimedia Tools and Applications. doi:10.1007/s11042-015-2487-7.
    • (2015) doi:10.1007/s11042-015-2487-7
    • Farash, M.S.1    Kumari, S.2    Bakhtiari, M.3
  • 21
    • 85010364277 scopus 로고    scopus 로고
    • A provably secure and efficient two-party password-based explicit uthenticated key exchange protocol resistance to password guessing attacks
    • Concurrency and Computation, Practice and Experience
    • Farash, M. S., Islam, S. H., & Mohammad, S. O. (2015). A provably secure and efficient two-party password-based explicit uthenticated key exchange protocol resistance to password guessing attacks. Concurrency and Computation: Practice and Experience. doi:10.1002/cpe.3477.
    • (2015)
    • Farash, M.S.1    Islam, S.H.2    Mohammad, S.O.3
  • 22
    • 63449122349 scopus 로고    scopus 로고
    • Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption)〈〈 cost (signature) + cost (encryption). In Advances in Cryptology-CRYPTO’97 (pp. 165–179). Berlin: Springer
    • Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption)〈〈 cost (signature) + cost (encryption). In Advances in Cryptology-CRYPTO’97 (pp. 165–179). Berlin: Springer.
  • 23
    • 84935865949 scopus 로고    scopus 로고
    • A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks, Information Sciences
    • He, D., Kumar, N., & Chilamkurti, N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks, Information Sciences. doi:10.1016/j.ins.2015.02.010
    • (2015) & Chilamkurti, N
    • He, D.1    Kumar, N.2
  • 24
    • 84921481484 scopus 로고    scopus 로고
    • Authentication protocol for an ambient assisted living system
    • He, D., & Zeadally, S. (2015). Authentication protocol for an ambient assisted living system. Communications Magazine, IEEE, 53(1), 71–77.
    • (2015) Communications Magazine, IEEE , vol.53 , Issue.1 , pp. 71-77
    • He, D.1    Zeadally, S.2
  • 25
    • 84928669844 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems
    • Chaudhry, S., Naqvi, H., Shon, T., Sher, M., & Farash, M. (2015). Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. Journal of Medical Systems, 39(6), 1–11. doi:10.1007/s10916-015-0244-0.
    • (2015) Journal of Medical Systems , vol.39 , Issue.6 , pp. 1-11
    • Chaudhry, S.1    Naqvi, H.2    Shon, T.3    Sher, M.4    Farash, M.5
  • 26
    • 84925242256 scopus 로고    scopus 로고
    • Abdalla, M., Benhamouda, F., & Pointcheval, D. (2015). Public-key encryption indistinguishable under plaintext-checkable attacks. In Public-Key Cryptography—PKC 2015 (pp. 332–352). Berlin: Springer
    • Abdalla, M., Benhamouda, F., & Pointcheval, D. (2015). Public-key encryption indistinguishable under plaintext-checkable attacks. In Public-Key Cryptography—PKC 2015 (pp. 332–352). Berlin: Springer.
  • 27
    • 84925507784 scopus 로고    scopus 로고
    • An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography, Multimedia Tools and Applications
    • Ch, S. A., Nizamuddin, N., Sher, M., Ghani, A., Naqvi, H., & Irshad, A. (2014). An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimedia Tools and Applications. doi:10.1007/s11042-014-2283-9.
    • (2014) & Irshad, A
    • Ch, S.A.1    Nizamuddin, N.2    Sher, M.3    Ghani, A.4    Naqvi, H.5
  • 28
    • 84861166810 scopus 로고    scopus 로고
    • Ch, S. A., Nizamuddin, N., & Sher, M. (2012). Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In Information systems, technology and management (pp. 135–142). Springer
    • Ch, S. A., Nizamuddin, N., & Sher, M. (2012). Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In Information systems, technology and management (pp. 135–142). Springer.
  • 29
    • 80755159505 scopus 로고    scopus 로고
    • Nizamuddin, N., Ch, S. A., Nasar, W., & Javaid, Q. (2011)Efficient signcryption schemes based on hyperelliptic curve cryptosystem. In 2011 7th IEEE international conference on emerging technologies (ICET) (pp. 1–4)
    • Nizamuddin, N., Ch, S. A., Nasar, W., & Javaid, Q. (2011.)Efficient signcryption schemes based on hyperelliptic curve cryptosystem. In 2011 7th IEEE international conference on emerging technologies (ICET) (pp. 1–4).
  • 31
    • 63449122349 scopus 로고    scopus 로고
    • Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption) cost (signature) + cost (encryption). In Advances in cryptology-CRYPTO’97 (pp. 165–179). Santa Barbara: Springer
    • Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption) cost (signature) + cost (encryption). In Advances in cryptology-CRYPTO’97 (pp. 165–179). Santa Barbara: Springer.
  • 32
    • 79959762596 scopus 로고    scopus 로고
    • Secure smart card based password authentication scheme with user anonymity
    • Li, C.-T. (2011). Secure smart card based password authentication scheme with user anonymity. Information Technology and Control, 40(2), 157–162.
    • (2011) Information Technology and Control , vol.40 , Issue.2 , pp. 157-162
    • Li, C.-T.1
  • 33
    • 80053369762 scopus 로고    scopus 로고
    • A new efficient key agreement scheme for vsat satellite communications based on elliptic curve cryptosystem
    • Hong, J.-W., Yoon, S.-Y., Park, D.-I., Choi, M.-J., Yoon, E.-J., & Yoo, K.-Y. (2011). A new efficient key agreement scheme for vsat satellite communications based on elliptic curve cryptosystem. Information Technology and Control, 40(3), 252–259.
    • (2011) Information Technology and Control , vol.40 , Issue.3 , pp. 252-259
    • Hong, J.-W.1    Yoon, S.-Y.2    Park, D.-I.3    Choi, M.-J.4    Yoon, E.-J.5    Yoo, K.-Y.6
  • 34
    • 84953639516 scopus 로고    scopus 로고
    • A provably secure and efficient authentication scheme for access control in mobile pay-tv systems. Multimedia Tools and Applications
    • Farash, M. S., & Attari, M. A. (2014). A provably secure and efficient authentication scheme for access control in mobile pay-tv systems. Multimedia Tools and Applications. doi:10.1007/s11042-014-2296-4.
    • (2014) doi:10.1007/s11042-014-2296-4
    • Farash, M.S.1    Attari, M.A.2
  • 36
    • 84884222500 scopus 로고    scopus 로고
    • Improvement of a three-party password-based key exchange protocol with formal verification
    • Xie, Q., Dong, N., Tan, X., Wong, D. S., & Wang, G. (2013). Improvement of a three-party password-based key exchange protocol with formal verification. Information Technology And Control, 42(3), 231–237.
    • (2013) Information Technology And Control , vol.42 , Issue.3 , pp. 231-237
    • Xie, Q.1    Dong, N.2    Tan, X.3    Wong, D.S.4    Wang, G.5
  • 37
    • 84955203633 scopus 로고    scopus 로고
    • Xie, Q., Dong, N., Wong, D. S., & Hu, B. Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol. International Journal of Communication Systems
    • Xie, Q., Dong, N., Wong, D. S., & Hu, B. Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol. International Journal of Communication Systems. doi:10.1002/dac.2858
  • 39
    • 84874418956 scopus 로고    scopus 로고
    • Proving more observational equivalences with proverif
    • Basin D, Mitchell JC, (eds), Springer, Berlin
    • Cheval, V., & Blanchet, B. (2013). Proving more observational equivalences with proverif. In D. Basin & J. C. Mitchell (Eds.), Principles of security and trust (pp. 226–246). Berlin: Springer.
    • (2013) Principles of security and trust , pp. 226-246
    • Cheval, V.1    Blanchet, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.