DocumentCode :
3508657
Title :
Secure Mobile Payment via Trusted Computing
Author :
Li, Qi ; Zhang, Xinwen ; Seifert, Jean-Pierre ; Zhong, Hulin
Author_Institution :
Dept. of Comput. Sci., Tsinghua Univ., Beijing
fYear :
2008
fDate :
14-17 Oct. 2008
Firstpage :
98
Lastpage :
112
Abstract :
Mobile payment (m-payment) received significant attention because it enables an easy payment mechanism and becomes an important complement to traditional payment means. However, m-payment over open devices and networks poses security challenges of a new dimension. Although many researchers address security issues in m-payment, there are still some security problems that are not well resolved, such as platform integrity and user privacy protection. In this paper, we propose a general payment architecture with Trusted Computing (TC) technologies to secure mobile payment. Using only a simple mobile payment infrastructure, a platform integrity protection solution is proposed to secure payment software downloading, application initialization, and secure payment transactions. We further propose two schemes to enhance the performance and flexibility of our solution. The first scheme provides platform attestation using an identity-based signature (IBS) algorithm instead of a traditional credential-based public-key signature algorithm within Trusted Computing Group (TCG) technologies, which fully utilizes the merits of the mobile computing infrastructure and improves the flexibility and performance of the payment solution. The second scheme provides attestation caching without sacrificing security achievements. We have implemented a real prototype system based on an emulated payment environment. Our security analysis and experimental results prove that our scheme can effectively meet the security requirements of a practical m-payment with acceptable performance.
Keywords :
data privacy; electronic trading; mobile computing; security of data; identity-based signature; m-payment; secure mobile payment; trusted computing; user privacy protection; Application software; Communication system security; Computer architecture; Data security; Information security; Mobile communication; Mobile computing; Mobile handsets; Privacy; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trusted Infrastructure Technologies Conference, 2008. APTC '08. Third Asia-Pacific
Conference_Location :
Hubei
Print_ISBN :
978-0-7695-3363-6
Type :
conf
DOI :
10.1109/APTC.2008.24
Filename :
4683087
Link To Document :
بازگشت