CFP last date
20 December 2024
Reseach Article

Mobile Banking System based on Certificateless Chameleon Hash Function

by Tejeshwari Thakur, Birendra Kumar Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 7
Year of Publication: 2015
Authors: Tejeshwari Thakur, Birendra Kumar Sharma
10.5120/21549-4543

Tejeshwari Thakur, Birendra Kumar Sharma . Mobile Banking System based on Certificateless Chameleon Hash Function. International Journal of Computer Applications. 121, 7 ( July 2015), 1-5. DOI=10.5120/21549-4543

@article{ 10.5120/21549-4543,
author = { Tejeshwari Thakur, Birendra Kumar Sharma },
title = { Mobile Banking System based on Certificateless Chameleon Hash Function },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 7 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number7/21549-4543/ },
doi = { 10.5120/21549-4543 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:07:47.408574+05:30
%A Tejeshwari Thakur
%A Birendra Kumar Sharma
%T Mobile Banking System based on Certificateless Chameleon Hash Function
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 7
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile phones are most common way of communication and accessing internet based services. Currently, mobile phones are not only used for regular data communication but also, sending and receiving sensitive data. However, the security of mobile communication is very important concerns for mobile phone users. In this paper we first proposes new payment system with mobile banking, using certificateless chameleon hash function which is does not suffer from the key escrow problem. The proposed scheme is secure known key attack, key compromise attack and unknown share key attack. Also proposed more efficient and low computational cost compare the [11].

References
  1. G. Ateniese and B. de Medeiros. Identity-based chameleon hash and applications, FC 2004, Lecture Notes in Computer Science 3110, Springer-Verlag 2004, pages 164-180, 2004.
  2. D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto 2001, Lecture Notes in Computer Science 2139, Springer-Verlag 2001, pages 213-229, 2001.
  3. X. Chen, F. Zhang, H. Tian, B. Wei, K. Kim, Discrete logarithm based chameleon hashing and signatures without key exposure. Computers and Electrical Engineering, 37(4): pages 614- 623, 2011.
  4. X. Chen, F. Zhang, W. Susilo, H. Tian, J. Li, K. Kim, Identity based chameleon hash scheme without key exposure, In: Proc. of ACISP10, Lecture Notes in Computer Science 6168, Springer-Verlag 2010, pages 200-215, 2010.
  5. H. Hongxia, Certificateless based chameleon hash scheme, IEEE computer soiceity, pages 1126-1129, 2012.
  6. H. Krawczyk and T. Rabin, Chameleon hashing and signatures, Proc. of NDSS 2000, pages 143-154, 2000.
  7. C. Narendiran, S. A. Rabara, and N. Rajendran. Performance evaluation on end-to-end security architecture for mobile banking system. Wireless Days, 2008. WD 08. 1st IFIP, pages 1-5, 2008.
  8. S. A. Riyami, K. Paterson, Certificateless public key cryptography, Asiacrypt 2003, Lecture Notes in Computer Science 2894, Springer Heidelberg 2003, pages 452-473, 2003.
  9. S. A. Shubat and M. A. Ashraf. Secure protocol for short message service. In Proc. of world academy of science, engineering and technology, 3(1): pages 745-749, 2009.
  10. M. Sunanda V. R. Prasad and V. Maruthi Prasad. Secure sms with identity based cryptography in mobile telecommunication networks. International Journal of Computer Science and Technology, 2(4): pages 166-169, 2011.
  11. J-S. Wang, F-Yi Yang, and I-Paik, A Novel E-cash Payment Protocol Using Trapdoor Hash Function on Smart Mobile Devices, International Journal of Computer Science and Network Security, Volume. 11, No. 6,pages 12-19, 2011.
  12. F. Zhang, R. Safavi-Naini, W. Susilo. ID-Based chameleon hashes from bilinear pairings. Cryptology ePrint Archive, Report 2003/208, available at http://www. iacr. org/2003/208.
  13. S. Zhao, A. Aggarwal, and S. Liu. Building secure userto- user messaging in mobile telecommunication networks. In Wireless Telecommunications Symposium (WTS) 2008, pages 151-157, 2008.
  14. L. Zhuo, T. Wang, J. Zhong, H. Shu, L. Wang, and F. Zhu. Design of secure access system of mobile bank based on pki with smart card. In 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC) 2011, pages 1057-1060, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Chameleon Hashing Certificateless Cryptography Mobile Banking