Skip to main content

Improving Security of SET Protocol Based on ECC

  • Conference paper
Web Information Systems and Mining (WISM 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6987))

Included in the following conference series:

Abstract

SET (Secure Electronic Transaction) is a standard protocol for the credit card transaction in e-commerce. In order to improve the security and authentication efficiency of SET, a scheme was put forward. Adopting ECC (Elliptic Curve Cryptography) instead RSA performed authentication and verified the integrity of data, and the public key and private key of cardholder, merchant, payment gateway, and certificate authority were distributed based on ECC. Using dual signature, the payment information of cardholder was confidential to the merchant, the order information of cardholder kept secret to the payment gateway. Cardholder, merchant and payment gateway could authorize and verify message integrity each other in payment processing. Security analysis shows that this scheme has high security and efficient authentication.

This work is supported by the National Natural Science Foundation of China under Grant No. 60972078; the Gansu Provincial Natural Science Foundation of China under Grant No. 0916RJZA015.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhang, Y., Deng, X., Li, Y., et al.: E-commerce security assessment under group decision making. Journal of Information and Computational Science 8(1), 7–15 (2011)

    Google Scholar 

  2. Wu, Y.: E-commerce security based on a security engineering life cycle. Advanced Materials Research 171-172, 640–643 (2011)

    Article  Google Scholar 

  3. Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn., pp. 549–559 (2007)

    Google Scholar 

  4. Wang, G.: An abuse-free fair contract-signing protocol based on the RSA signature. IEEE Transactions on Information Forensics and Security 5(1), 158–168 (2010)

    Article  MathSciNet  Google Scholar 

  5. Schäge, S., Schwenk, J.: A new RSA-based signature scheme. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 1–15. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Dennis, H., Eike, K.: Programmable Hash Functions and Their Applications (Article in Press). Journal of Cryptology, 1–44 (2011)

    Google Scholar 

  7. Jurisc, A., Menezes, A.: Elliptic Curve Cryptography. Dr. Dobb’s Journal, 135–140 (April 1997)

    Google Scholar 

  8. Hankerson, D., Hernandez, J., Menezes, A.: Software Implementation of Elliptic Curve Cryptography over Binary Fields. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 1–267. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cao, LC. (2011). Improving Security of SET Protocol Based on ECC. In: Gong, Z., Luo, X., Chen, J., Lei, J., Wang, F.L. (eds) Web Information Systems and Mining. WISM 2011. Lecture Notes in Computer Science, vol 6987. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23971-7_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23971-7_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23970-0

  • Online ISBN: 978-3-642-23971-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics