Fair Security Protocols with off-line TTP

被引:0
|
作者
Wang, Xi [1 ]
Wen, Xiangming [1 ]
Liang, Changxin [2 ]
Liu, Ye [3 ]
Lin, Xinqi [1 ,4 ]
机构
[1] BUPT, Sch Informat & Telecommun Engn, Beijing 100876, Peoples R China
[2] Beijing Municipal Commiss Dev & Reform, Beijing 100031, Peoples R China
[3] BUPT, Sch Econ & Management, Beijing 100876, Peoples R China
[4] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Fuzhou 350007, Fujian, Peoples R China
基金
美国国家科学基金会;
关键词
Multiple HASH chains; PPV protocol; Value-added service; Fairness; SYSTEMS;
D O I
10.1109/IUCE.2009.58
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A fair e-commence protocol can help the Value-Added Service Provider(VASP) and users deal with the exchange safely and efficiently. In this paper, we firstly analyze a PPV(Pay-Per-View) protocol, and find some potential shortcomings and limitations. By multiplying the HASH chains technology, we employ a couple of HASH chains as billing cell, and improve the fairness problem which a cell's loss existed when communication interrupted. Consequently, we propose a new protocol. We assume that user, VASP and mobile network operators communicate each other with an agreed session key. This protocol is able to achieve the service application and payment function commendably. The protocol is specially fit for mobile communication network environment(ad-hoc) as the low computing and storing requirement in mobile terminals,. By systematic research, the protocol not only satisfies the fairness, non-repudiation and security, but also is simply and efficient, so it is a commendable mobile payment protocol.
引用
收藏
页码:109 / +
页数:2
相关论文
共 50 条
  • [21] Buyer-seller watermarking protocols with off-line trusted parties
    Fan, Chun-, I
    Chen, Ming-Te
    Sun, Wei-Zhe
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 1035 - +
  • [22] Online/Off-line Ring Signature Scheme with Provable Security
    Kar, Jayaprakash
    2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 197 - 197
  • [23] Using different imaging (on-line and off-line) verification protocols in daily practice
    Kristensen, B.
    RADIOTHERAPY AND ONCOLOGY, 2007, 84 : S131 - S132
  • [24] Money conservation via atomicity in fair off-line e-cash
    Xu, SH
    Yung, MT
    Zhang, GD
    Zhu, H
    INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 14 - 31
  • [25] Off-line accountability
    Mehta, M
    INDUSTRIAL ENGINEER, 2006, 38 (04): : 53 - 53
  • [26] OFF-LINE MANAGEMENT
    ALLDERIGE, JM
    DATAMATION, 1968, 14 (06): : 43 - +
  • [27] Secure authentication protocols to resist off-line attacks on authentication data table
    Falmari, Vinod Ramesh
    Brindha, M.
    JOURNAL OF COMPUTER SECURITY, 2024, 32 (01) : 53 - 76
  • [28] The Off-line and On-line Impact of Information and Communications Technology on ASEAN Security - a Perspective
    Singh, Bilveer
    3RD INTERNATIONAL CONFERENCE ON SOCIAL AND POLITICAL SCIENCE (ICOSAPS), 2017, : 1 - 11
  • [29] Buyer-seller watermarking protocols with off-line trusted third parties
    Fan, Chun-I
    Chen, Ming-Te
    Sun, Wei-Zhe
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2009, 4 (01) : 36 - 43
  • [30] Analysing Password Protocol Security Against Off-line Dictionary Attacks
    Corin, Ricardo
    Doumen, Jeroen
    Etalle, Sandro
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 121 : 47 - 63