[1]宁卓,石伟,孙知信. 基于格的第三方移动支付加密模型ECC-NTRU[J].计算机技术与发展,2017,27(01):84-88.
 NING Zhuo,SHI We,SUN Zhi-xin. A Secure M-payment Model Combing NTRU with ECC[J].,2017,27(01):84-88.
点击复制

 基于格的第三方移动支付加密模型ECC-NTRU()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年01期
页码:
84-88
栏目:
安全与防范
出版日期:
2017-01-10

文章信息/Info

Title:
 A Secure M-payment Model Combing NTRU with ECC
文章编号:
1673-629X(2017)01-0084-05
作者:
 宁卓石伟孙知信
 南京邮电大学 物联网学院
Author(s):
 NING ZhuoSHI WeSUN Zhi-xin
关键词:
 移动支付RSA ECC NTRU量子计算
Keywords:
 mobile paymentRSAECCNTRUquantum attack
分类号:
TP301
文献标志码:
A
摘要:
 随着移动互联网以及移动智能终端的普及,移动支付成为越来越频繁的支付方式。针对量子计算给传统的公钥加密系统带来的威胁,利用NTRU算法的抗量子计算以及高效性加解密的特点,同时为了避免NTRU在签名算法上的失效,结合ECC具有高效的签名算法的优势,采用哈希链进行身份认证,设计出一种ECC-NTRU的移动支付加密方案。通过理论分析对比,表明该方案增强了移动支付加密的安全性,可以抗击量子攻击以及中间人攻击,同时对比性能可知该方案可以提高加解密速率,优化系统流畅度。虽然ECC-NTRU相对ECC模型增加了115 KB左右的系统开销,但是相对现在智能手机GB级别的内存,增大的开销完全可以承受,运行速度相比ECC快了几百倍,这极大地提高了智能终端程序的流畅度,因而具有很强的实用性。
Abstract:
 With the popularity of wireless Internet and smart phones,mobile payment has become more and more frequent. For the threat of quantum computation to the traditional public-key encryption system,using the features of anti-quantum computing and high efficien-cy for encryption and decryption of NTRC algorithm and avoiding the failure of NTRU in signature,combined with ECC with the advan-tages of efficient signature algorithm,adopting Hash chain to identity authentication,a mobile payment encryption scheme of ECC-NTRU is designed. By comparison with theoretical analysis,it shows that the scheme is to enhance the security of the encryption mobile payment and fight the attack of quantum and middle. At the same time comparative performance shows this scheme can improve the encryption speed and fluency. Although the ECC-NTRU increases system overhead by about 115 KB compared with ECC,the increasing cost can afford in comparison with smart phones with level of GB of memory,running faster than ECC hundreds,which greatly improves the flu-ency of intelligent terminal program with very strong practicability.

相似文献/References:

[1]施小华 王志坚.移动支付的安全方案研究[J].计算机技术与发展,2007,(04):108.
 SHI Xiao-hua,WANG Zhi-jian.A Secure Payment Scheme for Mobile Payment System[J].,2007,(01):108.
[2]查敦林 喻勇 孙知信.基于LTE网络的移动支付业务的研究[J].计算机技术与发展,2011,(01):222.
 ZHA Dun-lin,YU Yong,SUN Zhi-xin.Research on Mobile Payment Based on LTE Networks[J].,2011,(01):222.
[3]韩景灵,张秀英.基于WPKI技术的安全移动支付系统研究[J].计算机技术与发展,2014,24(06):156.
 HAN Jing-ling,ZHANG Xiu-ying.Research on Mobile Safe Payment System Based on WPKI[J].,2014,24(01):156.
[4]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(01):1.
[5]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(01):5.
[6]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(01):13.
[7]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(01):21.
[8]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(01):25.
[9]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(01):29.
[10]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(01):34.

更新日期/Last Update: 2017-04-01