Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Secure E-payment Protocol
Sattar J Aboud
Pages - 85 - 92     |    Revised - 30-10-2009     |    Published - 30-11-2009
Volume - 3   Issue - 5    |    Publication Date - November 2009  Table of Contents
Cryptography, Computer Security, Communications and Data Security
The vast spreading of information in the last decade has led to great development in e-commerce. For instance, e-trade and e-bank are two main Internet services that implement e-transaction from anyplace in the world. This helps merchant and bank to ease the financial transaction process and to give user friendly services at any time. However, the cost of workers and communications falls down considerably while the cost of trusted authority and protecting information is increased. E-payment is now one of the most central research areas in e-commerce, mainly regarding online and offline payment scenarios. In this paper, we will discuss an important e-payment protocol namely Kim and Lee scheme examine its advantages and delimitations, which encourages the author to develop more efficient scheme that keeping all characteristics intact without concession of the security robustness of the protocol. The suggest protocol employs the idea of public key encryption scheme using the thought of hash chain. We will compare the proposed protocol with Kim and Lee protocol and demonstrate that the proposed protocol offers more security and efficiency, which makes the protocol workable for real world services.
CITED BY (4)  
1 Pukkasenung, P., & Chokngamwong, R. (2016). Review and Comparison of Mobile Payment Protocol. In Advances in Parallel and Distributed Computing and Ubiquitous Services (pp. 11-20). Springer Singapore.
2 Alam, K. M. R., Mahmud, S., & Khan, M. N. A. (2013). An Exploitation of Blind Signature Schemes to Simulate Privacy-related Applications. International Journal of Computer Applications, 66(3).
3 Vadgama, V., Tanti, B., Modi, C., & Doshi, N. (2012). A novel approach for e-payment using virtual password system. arXiv preprint arXiv:1208.3859.
4 Kane, A. M. (2010). On the use of continued fractions for electronic cash. International Journal of Computer Science and Security, 4(1), 136-148.
1 Directory of Open Access Journals (DOAJ)
2 Google Scholar
3 ScientificCommons
4 Academic Index
5 CiteSeerX
6 refSeek
8 Socol@r
9 ResearchGATE
10 Bielefeld Academic Search Engine (BASE)
11 Scribd
12 WorldCat
13 slideshare
15 PdfSR
1 C Wang, C Chang and C Lin, "A new micro-payment system using general pay-word chain. Electronic Commerce", Research Journal, 2(1-2): 159-168, 2002
2 Y Mu, K Nguyen and V Varadharajan, "A fair electronic cash scheme", In Proceeding of the International Symposium in Electronic Commerce, LNCS 2040, Springer-Verlag, pp. 20–32, 2001.
3 N Someren, "The practical problems of implementing Micro mint", In proceeding of the International Conference of Financial Cryptography, LNCS 2339, Springer-Verlag, pp. 41-50, 2001
4 N Someren, A Odlyzko, R Rivest, T Jones and D Scot, "Does anyone really need micropayments", In proceeding of the International Conference of Financial Cryptography, LNCS 2742, Springer-Verlag, pp. 69-76, 2003.
5 S Yen, L Ho and C Huang, "Internet micro-payment based on unbalanced one-way binary tree", In Proceeding the International Conference of Cryptec'99, 155-162, 1999.
6 S Kim and W Lee, “A Pay-word-based micro-payment protocol supporting multiple payments”, In Proceeding of the International Conference on Computer Communications and Networks, pp. 609-612, 2003
7 D Chaum, Fiat and M Naor, "Untraceable electronic cash", In Proceeding Advances in Cryptology, LNCS 403, Springer-Verlag, pp. 319-327, 1988.
8 S Glassman, M Manasse, M Abadi, P Gauthier and P Sobalvarro, "The Millicent protocol for inexpensive electronic commerce", In Proceeding of the International World Wide Web Conference, pp. 603–618, O'Reilly, 1995.
9 R Rivest, "Electronic lottery tickets as micropayments", In Proceeding of the International Conference of Financial Cryptography, LNCS 1318, Springer-Verlag, pp. 307–314, 1997
10 E Foo and C Boyd, "A payment scheme using vouchers", In Proceeding of the International Conference of Financial Cryptography, LNCS 1465, Springer-Verlag, pp. 103-121, 1998.
11 Baddeley M, "Using e-cash in the new economy: An economic analysis of micro-payment systems", Journal of Electronic Commerce Research, 5 (4), 2004
12 J Hubaux, and L Buttyan, "A micro-payment scheme encouraging collaboration in multi-hop cellular networks", In Proceeding of Financial Cryptography, LNCS 2742, Springer-Verlag, pp. 15–33, 2003.
13 Koblitz N, "Elliptic Curve Cryptosystems", Mathematics of Computation, 48(2), 203-209, 1987.
14 H Chien, J Jan and Y Tseng, "RSA-based partially blind signature with low computation", In Proceeding of the International Conference in Parallel and Distributed Systems, pp. 385–389, USA, 2001.
15 Matthew N. Anyanwu, Lih-Yuan Deng & Dipankar Dasgupta, “Design of Cryptographically Strong Generator by Transforming Linearly Generated Sequences”, International Journal of Computer Science and Security, (IJCSS) Volume (3): Issue (3), 2009
16 Anil Kapil and Sanjeev Rana, Identity-Based Key Management in MANETs using Public Key Cryptography, International Journal of Security (IJS), Volume (3) : Issue (1), 2009
17 Ankur Agarwal, System-Level Modeling of a Network-on-Chip, International Journal of Computer Science and Security, (IJCSS) Volume (3): Issue (3), 2009
Professor Sattar J Aboud
- Iraq