Transaction Oriented Text Messaging with Trusted-SMS

作者: Antonio Grillo , Alessandro Lentini , Gianluigi Me , Giuseppe F. Italiano

DOI: 10.1109/ACSAC.2008.43

关键词:

摘要: The exponential growth of the Short Message Service(SMS) use has led this service to a widespread tool for social, marketing and advertising messaging. mobile devices are quickly becoming Personal Trust Devices (PTD), embedding personal data, which allow sending/receiving private information from/to PTD. This paper introduces our Trusted-SMS system, allows users exchange non-repudiable SMS's, digitally signed with Elliptic Curve Digital Signature Algorithm (ECDSA). system can fit in many scenarios, such as commercial transaction, bureaucratic delegation etc.. In fact, few bytes signature is embedded into single SMS, leaving bytes, depending on choice elliptic curve, SMS payload.

参考文章(16)
Masakazu Soshi, Atsuko Miyaji, Yusuke Sakabe, Toshio Ogiso, Software Obfuscation on a Theoretical Basis and Its Implementation IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. ,vol. 86, pp. 176- 186 ,(2003)
A. van der Merwe, R. Seker, A. Gerber, Phishing in the system of systems settings: mobile technology systems, man and cybernetics. ,vol. 1, pp. 492- 498 ,(2005) , 10.1109/ICSMC.2005.1571194
Kas Kalba, The Adoption of Mobile Phones in Emerging Markets: Global Diffusion and the Rural Challenge International Journal of Communication. ,vol. 2, pp. 31- ,(2008)
Don Johnson, Alfred Menezes, Scott Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA) International Journal of Information Security. ,vol. 1, pp. 36- 63 ,(2001) , 10.1007/S102070100002
Jeff Brown, Bill Shipman, Ron Vetter, SMS: The Short Message Service Computer. ,vol. 40, pp. 106- 110 ,(2007) , 10.1109/MC.2007.440
J.H. Saltzer, M.D. Schroeder, The protection of information in computer systems Proceedings of the IEEE. ,vol. 63, pp. 1278- 1308 ,(1975) , 10.1109/PROC.1975.9939
N.R. Potlapally, S. Ravi, A. Raghunathan, N.K. Jha, A study of the energy consumption characteristics of cryptographic algorithms and security protocols IEEE Transactions on Mobile Computing. ,vol. 5, pp. 128- 143 ,(2006) , 10.1109/TMC.2006.16
I. Arce, More bang for the bug: An account of 2003's attack trends ieee symposium on security and privacy. ,vol. 2, pp. 66- 68 ,(2004) , 10.1109/MSECP.2004.1264858
Zhi Li, J. Higgins, M. Clement, Performance of finite field arithmetic in an elliptic curve cryptosystem modeling analysis and simulation on computer and telecommunication systems. pp. 249- 256 ,(2001) , 10.1109/MASCOT.2001.948875
廖宏梓, 沈淵源, Yuan-Yuan Shen, Hung-Zih Liao, On the Elliptic Curve Digital Signature Algorithm 台中市:東海大學. ,(2006)