Title :
Mobile Commerce Identity Authentication Protocol Based on Conic Curves
Author :
Chen, Zhigang ; Song, Xinxia
Author_Institution :
Coll. of Comput. Sci. of Inf. Technol., Zhejiang Wanli Univ., Ningbo, China
Abstract :
The increasing development of mobile networks raises new security requirements and concerns. In addition to the basic need of authentication, confidentiality and key distribution services, a new problem involving privacy is the unauthorized tracking of users´ migration. We present here a mobile commerce identity authentication protocol. Our scheme based on conic curves. This scheme is composed of three part which need to use threshold signature and proxy signature. Because the security of license is determined by private key, not the arithmetic itself, user can not construct new license by given license and the public key as long as the private key is not leaked. Since encoding and decoding over conic are easily implement on conic curves, it has enabled our scheme to greatly enhance efficiency. We also analysis its security. The entire process guarantees the security and reliability.
Keywords :
authorisation; cryptographic protocols; decoding; digital signatures; electronic commerce; mobile computing; private key cryptography; public key cryptography; confidentiality; conic curve; decoding; encoding; identity authentication protocol; key distribution services; license security; mobile commerce; mobile networks; private key cryptosystem; proxy signature; public key cryptosystem; threshold signature; conic curve; digital signature; identity authentication; public-key cryptosystem;
Conference_Titel :
Web Information Systems and Mining (WISM), 2010 International Conference on
Conference_Location :
Sanya
Print_ISBN :
978-1-4244-8438-6
DOI :
10.1109/WISM.2010.141