%0 Conference Proceedings %T Mobile Electronic Identity: Securing Payment on Mobile Phones %+ Computing Science Laboratory - Oxford University %A Bangdao, Chen %A Roscoe, A., W. %Z Part 2: Mobile Authentication and Access Control %< avec comité de lecture %( Lecture Notes in Computer Science %B 5th Workshop on Information Security Theory and Practices (WISTP) %C Heraklion, Crete, Greece %Y Claudio A. Ardagna %Y Jianying Zhou %I Springer %3 Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication %V LNCS-6633 %P 22-37 %8 2011-06-01 %D 2011 %R 10.1007/978-3-642-21040-2_2 %Z Computer Science [cs]Conference papers %X The pervasive use of mobile phones has created a dynamic computing platform that a large percentage of the population carries routinely. There is a growing trend of integrating mobile phones with electronic identity, giving the phone the ability to prove or support the identity of the owner by containing, for example, a tuple of name, ID, photo and public key. While this helps phone owners prove who they are, it does not prove to them that they are giving their identities to intended parties. This is important in its own right for reasons of privacy and avoiding cases of “identity theft”, but all the more important when identity is being provided to support the transfer of value (e.g. in mobile payment) or information. In this paper we show how Human Interactive Security Protocols can support this type of authentication in cases where PKIs are inappropriate, misunderstood or too expensive, concentrating on the case of payment. %G English %Z TC 11 %Z WG 11.2 %2 https://inria.hal.science/hal-01573293/document %2 https://inria.hal.science/hal-01573293/file/978-3-642-21040-2_2_Chapter.pdf %L hal-01573293 %U https://inria.hal.science/hal-01573293 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-WISTP %~ IFIP-WG11-2 %~ IFIP-LNCS-6633