{"title":"一个安全的kiosk中心移动支付协议使用对称密钥技术","authors":"V. C. Sekhar, M. Sarvabhatla","doi":"10.1109/ICIINFS.2012.6304779","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a secure kiosk(Merchant) centric mobile payment scenario in which the customer is disconnected from issuer due to lack of internet connection(various reasons are mentioned below) and still can be used for mobile transaction. Our protocol protects the real identity of the customer during the transaction flow. The proposed protocol is based on symmetric key cryptography which further reduces computation at all the entities of the protocol. The protocol satisfies all the security requirements met by the existing standard protocols like SET, iKP, Kungpisdan et al and Tellez et al. Based on the author knowledge, the proposed protocol is the first protocol which satisfies all the cases of Non Repudiation. All the above mentioned protocols satisfies only Non Repudiation of Origin, where as our proposed protocol satisfies Non repudiation of Receipt, Non repudiation of Submission, Non repudiation of Delivery.","PeriodicalId":171993,"journal":{"name":"2012 IEEE 7th International Conference on Industrial and Information Systems (ICIIS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A secure kiosk centric mobile payment protocol using symmetric key techniques\",\"authors\":\"V. C. Sekhar, M. Sarvabhatla\",\"doi\":\"10.1109/ICIINFS.2012.6304779\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a secure kiosk(Merchant) centric mobile payment scenario in which the customer is disconnected from issuer due to lack of internet connection(various reasons are mentioned below) and still can be used for mobile transaction. Our protocol protects the real identity of the customer during the transaction flow. The proposed protocol is based on symmetric key cryptography which further reduces computation at all the entities of the protocol. The protocol satisfies all the security requirements met by the existing standard protocols like SET, iKP, Kungpisdan et al and Tellez et al. Based on the author knowledge, the proposed protocol is the first protocol which satisfies all the cases of Non Repudiation. All the above mentioned protocols satisfies only Non Repudiation of Origin, where as our proposed protocol satisfies Non repudiation of Receipt, Non repudiation of Submission, Non repudiation of Delivery.\",\"PeriodicalId\":171993,\"journal\":{\"name\":\"2012 IEEE 7th International Conference on Industrial and Information Systems (ICIIS)\",\"volume\":\"112 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-09-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE 7th International Conference on Industrial and Information Systems (ICIIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIINFS.2012.6304779\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE 7th International Conference on Industrial and Information Systems (ICIIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIINFS.2012.6304779","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A secure kiosk centric mobile payment protocol using symmetric key techniques
In this paper, we propose a secure kiosk(Merchant) centric mobile payment scenario in which the customer is disconnected from issuer due to lack of internet connection(various reasons are mentioned below) and still can be used for mobile transaction. Our protocol protects the real identity of the customer during the transaction flow. The proposed protocol is based on symmetric key cryptography which further reduces computation at all the entities of the protocol. The protocol satisfies all the security requirements met by the existing standard protocols like SET, iKP, Kungpisdan et al and Tellez et al. Based on the author knowledge, the proposed protocol is the first protocol which satisfies all the cases of Non Repudiation. All the above mentioned protocols satisfies only Non Repudiation of Origin, where as our proposed protocol satisfies Non repudiation of Receipt, Non repudiation of Submission, Non repudiation of Delivery.