The Community for Technology Leaders
2012 Seventh International Conference on Availability, Reliability and Security (2008)
Mar. 4, 2008 to Mar. 7, 2008
ISBN: 978-0-7695-3102-1
pp: 701-708
Certification path validation is a complex task that implies high computational cost. In this process is necessary to verify the binding between the owner ofthe certificate and his public key. In SET protocol, the customer and merchant require to verify the certification path of their certificates to trust each other. The customer and merchant carry out several cryptographic operations to complete SET protocol including the authentication process. Because mobile devices are limited in terms of processing and storage capacities, it is relevant to reduce the computational cost required by the cryptographic operations. In this paper, we apply TRUTHC (TrustRelationship Using Two Hash Chains) to reduce thecomputational cost of cryptographic operations carried out by the customer and merchant to complete the certification path validation. In addition, we compare the results using RSA and ECDSA protocols, with a typical PKI.
Mobile Payment, Certification Path Validation, Public Key Infrastructure (PKI), SET protocol
Francisco Rico-Novella, Rafael Martinez-Pel?ez, Cristina Satiz?bal, Jordi Forn?, "Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols", 2012 Seventh International Conference on Availability, Reliability and Security, vol. 00, no. , pp. 701-708, 2008, doi:10.1109/ARES.2008.101
108 ms
(Ver 3.3 (11022016))