Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Secure E-payment Protocol
Sattar J Aboud
Pages - 85 - 92 | Revised - 30-10-2009 | Published - 30-11-2009
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
Cryptography, Computer Security, Communications and Data Security
ABSTRACT
The vast spreading of information in the last decade has led to great development in e-commerce. For instance, e-trade and e-bank are two main Internet services that implement e-transaction from anyplace in the world. This helps merchant and bank to ease the financial transaction process and to give user friendly services at any time. However, the cost of workers and communications falls down considerably while the cost of trusted authority and protecting information is increased. E-payment is now one of the most central research areas in e-commerce, mainly regarding online and offline payment scenarios. In this paper, we will discuss an important e-payment protocol namely Kim and Lee scheme examine its advantages and delimitations, which encourages the author to develop more efficient scheme that keeping all characteristics intact without concession of the security robustness of the protocol. The suggest protocol employs the idea of public key encryption scheme using the thought of hash chain. We will compare the proposed protocol with Kim and Lee protocol and demonstrate that the proposed protocol offers more security and efficiency, which makes the protocol workable for real world services.
1 | Pukkasenung, P., & Chokngamwong, R. (2016). Review and Comparison of Mobile Payment Protocol. In Advances in Parallel and Distributed Computing and Ubiquitous Services (pp. 11-20). Springer Singapore. |
2 | Alam, K. M. R., Mahmud, S., & Khan, M. N. A. (2013). An Exploitation of Blind Signature Schemes to Simulate Privacy-related Applications. International Journal of Computer Applications, 66(3). |
3 | Vadgama, V., Tanti, B., Modi, C., & Doshi, N. (2012). A novel approach for e-payment using virtual password system. arXiv preprint arXiv:1208.3859. |
4 | Kane, A. M. (2010). On the use of continued fractions for electronic cash. International Journal of Computer Science and Security, 4(1), 136-148. |
Anil Kapil and Sanjeev Rana, Identity-Based Key Management in MANETs using Public Key Cryptography, International Journal of Security (IJS), Volume (3) : Issue (1), 2009 | |
Ankur Agarwal, System-Level Modeling of a Network-on-Chip, International Journal of Computer Science and Security, (IJCSS) Volume (3): Issue (3), 2009 | |
Baddeley M, "Using e-cash in the new economy: An economic analysis of micro-payment systems", Journal of Electronic Commerce Research, 5 (4), 2004 | |
C Wang, C Chang and C Lin, "A new micro-payment system using general pay-word chain. Electronic Commerce", Research Journal, 2(1-2): 159-168, 2002 | |
D Chaum, Fiat and M Naor, "Untraceable electronic cash", In Proceeding Advances in Cryptology, LNCS 403, Springer-Verlag, pp. 319-327, 1988. | |
E Foo and C Boyd, "A payment scheme using vouchers", In Proceeding of the International Conference of Financial Cryptography, LNCS 1465, Springer-Verlag, pp. 103-121, 1998. | |
H Chien, J Jan and Y Tseng, "RSA-based partially blind signature with low computation", In Proceeding of the International Conference in Parallel and Distributed Systems, pp. 385–389, USA, 2001. | |
J Hubaux, and L Buttyan, "A micro-payment scheme encouraging collaboration in multi-hop cellular networks", In Proceeding of Financial Cryptography, LNCS 2742, Springer-Verlag, pp. 15–33, 2003. | |
Koblitz N, "Elliptic Curve Cryptosystems", Mathematics of Computation, 48(2), 203-209, 1987. | |
Matthew N. Anyanwu, Lih-Yuan Deng & Dipankar Dasgupta, “Design of Cryptographically Strong Generator by Transforming Linearly Generated Sequences”, International Journal of Computer Science and Security, (IJCSS) Volume (3): Issue (3), 2009 | |
N Someren, "The practical problems of implementing Micro mint", In proceeding of the International Conference of Financial Cryptography, LNCS 2339, Springer-Verlag, pp. 41-50, 2001 | |
N Someren, A Odlyzko, R Rivest, T Jones and D Scot, "Does anyone really need micropayments", In proceeding of the International Conference of Financial Cryptography, LNCS 2742, Springer-Verlag, pp. 69-76, 2003. | |
R Rivest, "Electronic lottery tickets as micropayments", In Proceeding of the International Conference of Financial Cryptography, LNCS 1318, Springer-Verlag, pp. 307–314, 1997 | |
S Glassman, M Manasse, M Abadi, P Gauthier and P Sobalvarro, "The Millicent protocol for inexpensive electronic commerce", In Proceeding of the International World Wide Web Conference, pp. 603–618, O'Reilly, 1995. | |
S Kim and W Lee, “A Pay-word-based micro-payment protocol supporting multiple payments”, In Proceeding of the International Conference on Computer Communications and Networks, pp. 609-612, 2003 | |
S Yen, L Ho and C Huang, "Internet micro-payment based on unbalanced one-way binary tree", In Proceeding the International Conference of Cryptec'99, 155-162, 1999. | |
Y Mu, K Nguyen and V Varadharajan, "A fair electronic cash scheme", In Proceeding of the International Symposium in Electronic Commerce, LNCS 2040, Springer-Verlag, pp. 20–32, 2001. | |
Professor Sattar J Aboud
- Iraq
sattar_aboud@yahoo.com
|
|
|
|
View all special issues >> | |
|
|