Nothing Special   »   [go: up one dir, main page]

skip to main content
article

A Fairness-Enhanced Micropayment Scheme

Published: 01 October 2017 Publication History

Abstract

The micropayment scheme is widely used in the electronic payment, where the transaction value is tiny, meanwhile, the number of transactions is very huge. Recently, Liu and Yan proposed a lightweight micropayment scheme to achieve the efficiency, the fairness, and the privacy. However, the bank in the Liu---Yan's scheme maybe obtain the illegal benefits by controlling the selective result. In this paper, an enhanced fairness micropayment scheme is presented to resist the attack from the malicious bank. In addition, considering that most of the users have no motivation to verify the result due to the tiny transaction value, the observers are employed to audit the process for ensuring the fairness.

References

[1]
Tsiakis, T., & Sthephanides, G. (2005). The concept of security and trust in electronic payments. Computers and Security,22, 10---15.
[2]
Kima, C., Taoa, W., Shinb, N., & Kima, K. (2010). An empirical study of customers' perceptions of security and trust in e-payment systems. Electronic Commerce Research and Applications,9, 84---95.
[3]
Wen, X., Chen, Y., & Fang, J. (2013). An inter-bank e-payment protocol based on quantum proxy blind signature. Quantum Information Processing,12(1), 549---558.
[4]
Yang, C., & Wu, C. (2013). MSRC: Micropayment scheme with ability to return changes. Mathematical and Computer Modelling,58(1---2), 96---107.
[5]
Rivest, R. (1997). Electronic lottery tickets as micropayments. In Proceedings FC'97, LNCS (vol. 1318, pp. 307---314).
[6]
He, D., Zeadally, S., & Wu, L. (2015). Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal,.
[7]
Fu, Z., Sun, X., Liu, Q., Zhou, L., & Shu, J. (2015). Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications,E98-B(1), 190---200.
[8]
Xia, Z., Wang, X., Sun, X., & Wang, Q. (2015). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems,27(2), 340---352.
[9]
Fun, T., Beng, L., & Razali, M. (2013). Review of mobile macro-payment schemes. Journal of Advances in Computer Networks,1, 323---328.
[10]
Yen, S., Lin, H., Chen, Y., Hung, J., & Wu, J. (2014). Paystar: a denomination flexible micropayment scheme. Information Sciences,259, 160---169.
[11]
Daza, V., & Lombardi, F. (2015). Frodo: Fraud resilient device for off-line micropayment. IEEE Transactions on Dependable and Secure Computing.
[12]
Isern-Deyà, A., Payeras-Capellà, M., & Mut-Puigserver, M. (2013). Micropayment proposal with formal verification using coloured petri nets and performance analysis on the android platform. International Journal of Business Intelligence and Data Mining,8(1), 74---104.
[13]
Rotger, L., Capellà, M., & Puigserver, M. (2012). Anonymous, fair and untraceable micropayment scheme: Application to LBS. IEEE on Latin America Transactions,10, 1774---1784.
[14]
Chitra, K., & Kumar, G. (2012). Implication of secure micropayment system using process oriented structural design by hash chaining in mobile network. International Journal of Computer Science Issues,9, 329---339.
[15]
Rivest, R. L., & Shamir, A. (1997). Payword and micromint: Two simple micropayment schemes. In Security Protocols, (Vol. 1189, pp. 69---87). Berlin: Springer.
[16]
He, D., Zeadally, S., Kumar, N., & Lee, J. (2016). Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal,.
[17]
He, D., Kumar, N., Shen, H., & Lee, J. (2016). One-to-many authentication for access control in mobile pay TV systems. Science China-Information Sciences,59(5), 1---14.
[18]
Micali, S., & Rivest, R. L. (2002). Micropayment revisited. In Topics in Cryptology -- CT-RSA 2002 (Vol. 2271, pp. 149---163). Berlin: Springer.
[19]
Liu, Y., & Yan, J. (2013). A lightweight micropayment scheme based on lagrange interpolation formula. Security and Communication Networks,6(6), 955---960.
[20]
Li, G., Wang, H., & Chai, X. (2014). An efficient micro-payment protocol based on a single hash chain. Applied Mechanics and Materials,511, 1167---1171.
[21]
Fan, C., Liang, Y., & Wu C. (2011). An anonymous fair offline micropayment scheme. In Information Society, 2011 International Conference on IEEE (pp. 377---381).
[22]
Mullen, G., & Mummert, C. (2007). Finite fields and applications. Providence: American Mathematical Society.
[23]
Martínez-Peláez, R., Toral-Cruz, H., Ruiz, J., et al. (2015). P2PM-pay: Person to person mobile payment scheme controlled by expiration date. Wireless Personal Communications,85(1), 289---304.
[24]
Chowdhury, A., & Koval, D. (2009). Power distribution system reliability: Practical methods and applications. Hoboken: Wiley-IEEE.
[25]
Kremer, S., Ryan, M., Smyth, B. (2010). Election verifiability in electronic voting protocols. In LNCS (vol. 6345, pp. 389---404).
[26]
Liu, Y., Hu, L., & Liu, H. (2006). A micropayment scheme based on weighted multi-dimensional hash chain. Journal of Electronics (China),23, 791---794.

Cited By

View all
  • (2021)Robust evaluation method of communication network based on the combination of complex network and big dataNeural Computing and Applications10.1007/s00521-020-05264-033:3(887-896)Online publication date: 1-Feb-2021
  • (2020)BLE-Based Authentication Protocol for Micropayment Using Wearable DeviceWireless Personal Communications: An International Journal10.1007/s11277-020-07153-0112:4(2351-2372)Online publication date: 24-Jan-2020

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Wireless Personal Communications: An International Journal
Wireless Personal Communications: An International Journal  Volume 96, Issue 4
October 2017
1592 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 October 2017

Author Tags

  1. Enhanced fairness
  2. Hash chain
  3. Interpolation polynomial
  4. Micropayment
  5. Observer

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Robust evaluation method of communication network based on the combination of complex network and big dataNeural Computing and Applications10.1007/s00521-020-05264-033:3(887-896)Online publication date: 1-Feb-2021
  • (2020)BLE-Based Authentication Protocol for Micropayment Using Wearable DeviceWireless Personal Communications: An International Journal10.1007/s11277-020-07153-0112:4(2351-2372)Online publication date: 24-Jan-2020

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media