Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1806338.1806403acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

Micropayment schemes with ability to return changes

Published: 14 December 2009 Publication History

Abstract

Many secure micropayment schemes have been proposed as the desire to support the low-value and the high-volume purchases of some e-commerce applications such as mobile commerce services or web-based interactive video services. However it seems that no one studies how to add the ability of returning changes in micropayment schemes. In this paper, we take the lead in studying the micropayment schemes with ability to return changes (MSRC), which reduce the hash operations in transaction phase. When compared with the previous micropayment schemes, the proposed MSRC have the low computation costs and thus is more suitable and practical for mobile commerce environments, where have the limited computation capability and the limited bandwidth.

References

[1]
Rivest, R. and Shamir, A. 1996. PayWord and MicroMint: two simple micropayment schemes. In Proceedings of 1996 International Workshop on Security Protocols, LNCS Vol. 1189 (1996), 69--87.
[2]
Cryptographic hash algorithm, available at Competition http://csrc.nist.gov/groups/ST/hash/sha-3/
[3]
Mu, Y., Varadharajan, V. and Lin, Y. 1997. New micropayment schemes based on payWords. In Proceedings of the Australasian Conference on Information Security and Privacy, LNCS Vol. 1270 (1997), 283--293.
[4]
Patil, V. and Shyamasundar, R. K. 2004. An efficient, secure and delegable micro-payment system. In Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (2004).
[5]
Wang, C., Chang, C. and Lin, C. 2002. "A new micro-payment system using general payword chain", Electronic Commerce Research Journal, 2002, 159--168.
[6]
Yang, Z., Lang, W. and Tan, Y. 2004. A new fair micropayment system based on hash chain. In Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (2004), 139--145.
[7]
Dail, X., Ayoadel, O. and Grundy, J. 2006. Off-line micro-payment protocol for multiple vendors in mobile commerce. In Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (2006).
[8]
Yang, C. N., Lin, T. and Chen, T. S. 2005. Enhanced fair micropayment scheme based on hash chain to avoid merchant collusion". In Proceedings of the Ninth International Symposium on Consumer Electronic (2005), 39--42.
[9]
Dai, X. and Grundy, J. 2007. "NetPay: An off-line, decentralized micro-payment system for thin-client applications", Electronic Commerce Research and Applications, 2007, 91--101.
[10]
Lipton, R. J. and Ostrovsky, R. 1998. Micro-payments via efficient coin-flipping. In Proceedings of the International Conference of Financial Cryptography, LNCS Vol. 1465 (1998), 1--15.
[11]
Park, D., Boyd, C. and Dawson, E. 2001. Micro-payments for wireless communications. In Proceedings of the 3rd International Conference on Information Security and Cryptology, LNCS Vol. 2015 (2001), 192--205.
[12]
Huang, Z. and Chen, K. 2002. Electronic payment in mobile environment. In Proceedings of the 13th International Workshop on Database and Expert Systems Applications, LNCS Vol. 2453 (2002).
[13]
Kim, M., Lee, H., Kim, S., Lee, W. and Kang, E. 2002. Implementation of anonymity-based e-payment system for M-commerce. In Proceedings of the International Conference of Communications, Circuits, and Systems (2002).
[14]
Hwang, M. S. and Sung, P. C. 2006. "A study of micro-payment based on one-way hash chain", International Journal of Network Security, 2006, 81--90.
[15]
Bayyapul, P. R. and Das, M. L. 2009. "An improved and efficient micro-payment scheme", Journal of Theoretical and Applied Electronic Commerce Research, 2009, 91--100.
[16]
Yang, C. N. and Teng, H. T. 2003. An efficient method for finding minimum hash chain of multi-payword chains in micropayment. In Proceedings of the 2004 IEEE International Conference on E-Commerce (2004), 45--48.
[17]
Aumasson, J. P. Meier, W. and Mendel, F. 2008. Preimage attacks on 3-Pass HAVAL and step-reduced MD5. In the proceedings of 15th Workshop on Selected Areas in Cryptography (2008).

Cited By

View all
  • (2016)M&E-NetPay: A Micropayment System for Mobile and Electronic CommerceSymmetry10.3390/sym80800748:8(74)Online publication date: 3-Aug-2016
  • (2013)Anonymous and Fair Micropayment Scheme with Protection against Coupon TheftInternational Journal of Adaptive, Resilient and Autonomic Systems10.4018/jaras.20130401034:2(54-71)Online publication date: 1-Apr-2013
  • (2012)Micropayment scheme implementation on the Android platform with performance evaluationProceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia10.1145/2428955.2428974(64-73)Online publication date: 3-Dec-2012
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
iiWAS '09: Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
December 2009
763 pages
ISBN:9781605586601
DOI:10.1145/1806338
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Johannes Kepler University

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 December 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. e-commerce
  2. hash chain
  3. macropayment
  4. micropayment
  5. payword

Qualifiers

  • Research-article

Funding Sources

Conference

iiWAS '09
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2016)M&E-NetPay: A Micropayment System for Mobile and Electronic CommerceSymmetry10.3390/sym80800748:8(74)Online publication date: 3-Aug-2016
  • (2013)Anonymous and Fair Micropayment Scheme with Protection against Coupon TheftInternational Journal of Adaptive, Resilient and Autonomic Systems10.4018/jaras.20130401034:2(54-71)Online publication date: 1-Apr-2013
  • (2012)Micropayment scheme implementation on the Android platform with performance evaluationProceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia10.1145/2428955.2428974(64-73)Online publication date: 3-Dec-2012
  • (2011)Untraceable, anonymous and fair micropayment schemeProceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia10.1145/2095697.2095707(42-49)Online publication date: 5-Dec-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media