Identity-based cryptography in credit card payments

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Abstract

    In this paper we describe how to apply identity based cryptography to credit card payments. This would help with reducing the possibility of credit card fraud that is prevalent on the Internet. Our method is founded on the identity-based cryptography and it secures the credit card transactions in such a way that many types of credit card fraud become either impossible or much more difficult for the attacker to perform simply by stealing the credit card number and some related information. Our method would require some changes to the functionality of the credit cards and thus it is not an immediate remedy. However, the decreasing costs of more advanced hardware and the fairly fast cycle of reissuing new credit cards make it possible to include identity-based cryptography methods to credit cards in the near future.
    Original languageEnglish
    Title of host publicationCryptography and Security Systems
    PublisherSpringer
    Pages49-58
    ISBN (Print)978-3-662-44892-2, 978-3-662-44893-9
    DOIs
    Publication statusPublished - 2014
    MoE publication typeA4 Article in a conference publication
    EventThird International Conference, CSS 2014 - Lublin, Poland
    Duration: 22 Sep 201424 Sep 2014

    Publication series

    SeriesCommunications in Computer and Information Science
    Volume448
    ISSN1865-0929

    Conference

    ConferenceThird International Conference, CSS 2014
    Abbreviated titleCSS 2014
    CountryPoland
    CityLublin
    Period22/09/1424/09/14

    Keywords

    • identity-based cryptography
    • credit cards
    • security

    Fingerprint Dive into the research topics of 'Identity-based cryptography in credit card payments'. Together they form a unique fingerprint.

  • Cite this

    Halunen, K., & Sailio, M. (2014). Identity-based cryptography in credit card payments. In Cryptography and Security Systems (pp. 49-58). Springer. Communications in Computer and Information Science, Vol.. 448 https://doi.org/10.1007/978-3-662-44893-9_5