Skip to Main Content
In this paper, Secure Electronic Transaction protocol's operation mode in Electronic Commerce is analyzed, then designs an application scheme of Elliptic Curve Cryptography in SET protocol, including key generation, digital signature and envelop algorithms. And it introduces two fast algorithms of implementation of ECC. Finally, it presents a secure implementation model of SET transaction, which ensures the validity, confidentiality, integrity and non-repudiation of transaction.
Date of Conference: 24-27 June 2012