Analysis and Improvement on a Mobile Payment Protocol with Outsourced Verification in Cloud Service
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Analysis and Improvement on a Mobile Payment Protocol with Outsourced Verification in Cloud Service
  • 作者:KANG ; Baoyuan ; DU ; Jianqi ; SI ; Lin ; XIE ; Mingming
  • 英文作者:KANG Baoyuan;DU Jianqi;SI Lin;XIE Mingming;School of Computer Science and Technology, Tianjin Polytechnic University;
  • 英文关键词:mobile payment;;cloud service;;digital signature;;security;;bilinear map
  • 中文刊名:WHDZ
  • 英文刊名:武汉大学自然科学学报(英文版)
  • 机构:School of Computer Science and Technology, Tianjin Polytechnic University;
  • 出版日期:2019-05-13 15:17
  • 出版单位:Wuhan University Journal of Natural Sciences
  • 年:2019
  • 期:v.24;No.125
  • 基金:Supported by the Applied Basic and Advanced Technology Research Programs of Tianjin(15JCYBJC15900)
  • 语种:英文;
  • 页:WHDZ201903006
  • 页数:6
  • CN:03
  • ISSN:42-1405/N
  • 分类号:44-49
摘要
Mobile wallet is a very convenient means of mobile payment to allow the clients to conduct the payment via their mobile devices. To reduce the computation burden of resources-constraint mobile devices, a few mobile wallet protocols with outsourced verification in cloud computing were proposed. But in some of the protocols, there exist the risk of a colluding attack of the customer and the untrusted cloud server. In this paper, we propose an improved protocol, in which the payment information is protected by Hash function and random number. The malicious customer and cloud server cannot change the payment information to conduct a collusion forgery attack to defraud the merchant. The security analysis indicates that the proposed improved protocol can enhance the security in terms of correctness, unforgeability and traceability without increasing the computational burden.
        Mobile wallet is a very convenient means of mobile payment to allow the clients to conduct the payment via their mobile devices. To reduce the computation burden of resources-constraint mobile devices, a few mobile wallet protocols with outsourced verification in cloud computing were proposed. But in some of the protocols, there exist the risk of a colluding attack of the customer and the untrusted cloud server. In this paper, we propose an improved protocol, in which the payment information is protected by Hash function and random number. The malicious customer and cloud server cannot change the payment information to conduct a collusion forgery attack to defraud the merchant. The security analysis indicates that the proposed improved protocol can enhance the security in terms of correctness, unforgeability and traceability without increasing the computational burden.
引文
[1]Amoroso D L,Magnier-Watanabe R.Building a research model for mobile wallet consumer adoption:The case of mobile Suica in Japan[J].Journal of Theoretical and Applied Electronic Commerce Research,2012,7(1):94-110.
    [2]Shibin D,Kathrine J.A secure and hybrid approach for key escrow problem and to enhance authentic mobile wallets[J].Smart Innovation,Systems and Technologies,2019,105:81-89.
    [3]Varghese B,Buyya R.Next generation cloud computing:New trends and research directions[J].Future Generation Computer Systems,2018,79(3):849-861.
    [4]Kang B Y,Wang J Q,Shao D Y.Certificateless public auditing with privacy preserving for cloud-assisted wireless body area networks[J].Mobile Information Systems,2017,2017:2925465.
    [5]Wu T Y,Tseng Y M,Huang S S,et al.Non-repudiable provable data possession scheme with designated verifier in cloud storage systems[J].IEEE Access,2017,5:19333-19341.
    [6]Qin Z,Sun J F,Wahaballa A,et al.A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing[J].Computer Standards and Interfaces,2016,54:55-60.
    [7]Al-Riyami S,Paterson K.Certificateless public key cryptography[C]//Advances in Cryptology-ASIACRYPT 2003,Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer-Verlag,2003:452-473.
    [8]Cao S,Lang X,Liu X,et al.Probably secure and efficient certificateless aggregate signature[J].Netinfo Security,2019,19(1):42-50(Ch).
    [9]Xiong H.Cost-effective scalable and anonymous certificateless remote authentication protocol[J].IEEE Transaction and Information Forensics and Security,2014,9(12):2327-2339.
    [10]Kang B Y,Xu D.A secure certificateless aggregate signature scheme[J].International Journal of Security and Its Applications,2016,10(3):55-68.
    [11]Chen Y M,Cheng X G,Wang S,et al.Research on certificateless group signature scheme based on bilinear pairings[J].Netinfo Security,2017,17(3):53-58(Ch).
    [12]Liao Y J,He Y C,Li F G,et al.Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement[J].Computer Standards and Interfaces,2018,56:101-106.
    [13]Kang B Y,Wang J Q,Shao D Y.Attack on privacy-preserving public auditing schemes for cloud storage[J].Mathematical Problems in Engineering,2017,2017:8062182.
    [14]Kang B Y,Wang M,Jing D Y.An off-line payment scheme for digital content via subliminal channel[J].Journal of Information Science and Engineering,2018,34:171-192.
    [15]Wu T Y,Tseng Y M.Publicly verifiable multi-secret sharing scheme from bilinear pairings[J].IET Information Security,2013,7(3):239-246.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700