Title :
The application of Elliptic Curve Cryptography in Electronic Commerce
Author_Institution :
Sch. of Inf., Linyi Univ., Linyi, China
Abstract :
In this paper, Secure Electronic Transaction protocol´s operation mode in Electronic Commerce is analyzed, then designs an application scheme of Elliptic Curve Cryptography in SET protocol, including key generation, digital signature and envelop algorithms. And it introduces two fast algorithms of implementation of ECC. Finally, it presents a secure implementation model of SET transaction, which ensures the validity, confidentiality, integrity and non-repudiation of transaction.
Keywords :
cryptographic protocols; digital signatures; electronic commerce; public key cryptography; SET protocol; digital signature; electronic commerce; elliptic curve cryptography; envelop algorithms; key generation; secure electronic transaction protocol; Elliptic curve cryptography; Frequency modulation; Logic gates; Elliptic Curve Cryptography; Secure Electronic Transaction protocol; digital signature; secure transaction;
Conference_Titel :
Electrical & Electronics Engineering (EEESYM), 2012 IEEE Symposium on
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-4673-2363-5
DOI :
10.1109/EEESym.2012.6258715