Methods and systems for performing electronic commerce using mutating
identifiers. One method can include encrypting buyer transaction data
with a first mutating identifier, transmitting the buyer transaction data
to an authenticator device, decrypting the buyer transaction data,
generating a payment request, encrypting the payment request with a third
mutating identifier, and transmitting the payment request to a payment
authenticator device.