期刊文献+

一种适用于移动环境的认证和支付协议 被引量:7

An Efficient Authentication and Payment Protocol for Mobile Communication
下载PDF
导出
摘要 基于非平衡单向二进制树(UOBT)的微支付模型,设计了一个适用于移动用户向收费信息网络付费的微支付夫议。该协议可以实现通信各方的相互认证,能保证用户不被错误收费,同时提供收费信息网络防止用户抵赖的合法证据。 Based on a micro-payment model of Unbalanced One-way Binary Tree (UOBT), this paper proposes an efficient protocol for mutual authentication and electronic payment with the capability of arbitrating disputed bills. This protocal can protect subscribers from incorrect service charges and provide service providers legal evidences to collect bills that are denied.
出处 《电子与信息学报》 EI CSCD 北大核心 2005年第3期498-501,共4页 Journal of Electronics & Information Technology
基金 重庆市教委科学技术研究项目(020507)重庆市发展和改革委员会研究项目(20041072)资助课题
关键词 微支付 双向认证 密钥协商 匿名 Micro-payment, Mutual authentication, Key agreement, Anonymity
  • 相关文献

参考文献10

  • 1Peirce M, O'Mahony D. Flexible real-time payment methods for mobile communications[J]. IEEE Personal Communications Magazine, 1999, 6(6): 44 - 55.
  • 2Horn O G, Preneel B. Authentication and payment in future mobile systems[C]. In: Computer Security-ESORICS'98 Proceedings, Lecture Notes in Computer Science, Louvain-la-Neuve, Belgium,Springer Verlag, September 1998, 1485:277 - 293.
  • 3Martin K M, Preneel B, Mitchell C J, et al.. Secure Billing for Mobile Information Services in UMTS [M]. Antwerp, Belgium:Springer, May 1998:535 - 548.
  • 4李明柱,李志江,杨义先.移动通信增值服务认证和支付研究[J].通信学报,2003,24(4):123-127. 被引量:10
  • 5姬东耀,王育民.移动计算网络环境中的认证与小额支付协议[J].电子学报,2002,30(4):495-498. 被引量:12
  • 6Yen S, Ho L, Huang C. Internet micropayment based on unbalanced one-way binary tree. Proc. CrypTEC'99, Hong Kong,July 1999: 155- 162.
  • 7Tewari H, O'Mahony D. Real-time payments for mobile IP. IEEE Communications Magazine, 2003, 41(2): 126 - 136.
  • 8Molva R, Samfat D, Tsudik G. Authentication of mobile users. IEEE Networks, Special Issue in Mobile Communications, 1994,8 (2): 26 - 35.
  • 9Buttyan L. Removing the financial incentive to cheat in micropayment schemes [J]. IEEE Electronics Letters, 2000, 36(2):132- 133.
  • 10Jakobsson M. Ripping coins for a fair exchange [A]. Advances in Cryptology EuroCrypt'95, LNCS921 [C], St. Malo, France, May 1995:220 - 230.

二级参考文献16

  • 1[1]Z J Hass,R Alonso,D Duchamp,B Gopinath.Special issue on mobile and wireless comp uting networks [J].IEEE Journal on Selected Areas in Communications,1995,13(5) :839-923.
  • 2[2]R Molva,D Samfat,G Tsudic.Authentication of mobile users [J].IEEE Network,1994 ,8(2):26-34.
  • 3[3]S Mohan,Privacy and authentication protocols for PCS [J].IEEE personal communi cations magazine,1996,3(5):34-38.
  • 4[4]L Harn,H Lin.Modifications to enhance the security of GSM [A].Proc 5th Nat Con f on Information Security[C].Taiwan,1995.97-100.
  • 5[5]Y Frankel,A Herzberg.Security issues in a CDPD wireless network [J].IEEE Perso nal communications magazine,1995,2(4):16-27.
  • 6[6]ETSI SMG/SG/TD-73.Protocols for UMTS Providing Mutual Authentication and Key Es tablishment Using Asymmetric Techniques[S].
  • 7[7]M Bellare,S K Miner.A forward -secure digital signature scheme[A].Proc.Cryto ′99[C].Berlin:Springer.1999.431-448.
  • 8[8]S M Bellovin,M Merrit,Limitation of the kerberos authentication system [J].Com puter Communication Review,1990,20(5):119-132.
  • 9[9]R L Revest,A Shamir.Payword and micromint:two simple micropayment schemes [A]. Proc.Security Protocol[C].Berlin:Springer,1997.69-87.
  • 10ASPECT D10. Secure Billing: First Implementation[R]. AC095/SAG/W25/DS/P/10/1, February 1997.

共引文献17

同被引文献46

引证文献7

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部