Advertisement

Wireless Personal Communications

, Volume 63, Issue 1, pp 83–99 | Cite as

A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users

  • Jen-Ho Yang
  • Chin-Chen Chang
Article

Abstract

The electronic transactions on wireless mobile networks, which are also called mobile commerce, become more and more popular in recent years. In mobile commerce, the electronic payment is the most important component and thus many electronic payment schemes for mobile commerce are proposed. However, these schemes need to maintain a large authentication table for a large amount of mobile users. In addition, these schemes have heavy computation loads so they are not suitable for low computational-ability mobile devices. To overcome the above drawbacks, we propose a low computation-cost electronic payment scheme for mobile commerce in this paper. The proposed scheme can be applied to large-scale mobile user environments without maintaining a large authentication table. Moreover, the proposed scheme has low computation loads for mobile users because the elliptic curve cryptography is adopted in the proposed scheme. Therefore, the proposed scheme is more efficient and practical than the related works.

Keywords

Electronic payment User authentication Elliptic curve cryptography Mobile networks Mobile commerce 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Global System for Mobile Communications, http://www.gsmworld.com/.
  2. 2.
    The Third Generation Partnership Project, http://www.3gpp.org/.
  3. 3.
    Chen, L., Li, X., & Shi, M. (2007). A novel micro-payment scheme for m-commerce based on self-renewal hash chains. In Proceedings of 2007 international conference on communications, circuits, and systems, Japan (pp. 1343–1346).Google Scholar
  4. 4.
    Hwang R. J., Shiau S. H., Jan D. F. (2007) A new mobile payment scheme for roaming services. Electronic Commerce Research and Applications 6(2): 184–191CrossRefGoogle Scholar
  5. 5.
    Lee J. S., Chang Y. F., Chang C. C. (2008) Secure authentication protocols for mobile commerce transactions. International Journal of Innovative Computing, Information and Control 4(9): 2305–2314MathSciNetGoogle Scholar
  6. 6.
    Lin P., Chen H. Y., Fang Y., Jeng J. Y., Lu F. S. (2008) A secure mobile electronic payment architecture platform for wireless mobile networks. IEEE Transactions on Wireless Communications 7(7): 2705–2713CrossRefGoogle Scholar
  7. 7.
    Chaum, D., Fiat, A., & Naor, M. (1990). Untraceable electronic cash. Advances in cryptology-CRYPTO’88. Lecture notes in computer science, Springer (Vol. 403, pp. 319–327).Google Scholar
  8. 8.
    Kim S., Oh H. (2003) Efficient anonymous cash using the hash chain. IEICE Transactions on Communications E 86(B(3)): 1140–1143MathSciNetGoogle Scholar
  9. 9.
    Liaw H. T., Lin J. F., Wu W. C. (2007) A new electronic traveler’s check scheme based on one-way hash function. Electronic Commerce Research and Applications 6: 499–508CrossRefGoogle Scholar
  10. 10.
    Tsao C. J., Chen C. Y., Ku C. Y. (2002) An electronic bearer check system. IEICE Transactions on Communications 85(B(1): 325–331Google Scholar
  11. 11.
    Dai X., Grundy J. (2007) NetPay: An off-line, decentralized micro-payment system for thin-client applications. Electronic Commerce Research and Applications 6(1): 91–101CrossRefGoogle Scholar
  12. 12.
    Revist, R., & Shamir, A. (1997). Pay Word and MicroMint: Two simple micropayment schemes. In Proceedings of the fourth security protocol international workshop. Lecture notes in computer science, Springer (Vol. 1189, pp. 69–87).Google Scholar
  13. 13.
    Wang C. T., Chang C. C., Lin C. H. (2002) A new micro-payment system using general payword chain. Electronic Commerce Research 2(1–2): 159–168CrossRefGoogle Scholar
  14. 14.
    Rivest R. L., Shamir A., Adleman L. (1978) A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21(2): 120–126MathSciNetzbMATHCrossRefGoogle Scholar
  15. 15.
    Lee M., Ahn G., Kim J., Park J., Lee B., Kim K., Lee H. (2002) Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem. Journal of Communications and Networks 4(2): 81–89Google Scholar
  16. 16.
    Hankerson D., Menezes A., Vanstone S. (2004) Guide to elliptic curve cryptography. Springer, New York, USAzbMATHGoogle Scholar
  17. 17.
    Koblitz N. (1987) Elliptic curve cryptosystem. Mathematics of Computation 48: 203–209MathSciNetzbMATHCrossRefGoogle Scholar
  18. 18.
    Menezes A. J., Orschot P. C., Vanstone S. A. (1996) Hand-book of applied cryptography. CRC Press, Boca RatonCrossRefGoogle Scholar
  19. 19.
    Chen T. H., Lee W. B., Chen H. B. (2008) A round-and computation-efficient three-party authenticated key exchange protocol. The Journal of Systems and Software 81: 1581–1590CrossRefGoogle Scholar
  20. 20.
    Schnorr, C. P. (1990). Efficient identification and signatures for smart cards. Advances in cryptology-EUROCRYPTO’89. Lecture notes in computer science, Springer (Vol. 434, pp. 239–252).Google Scholar
  21. 21.
    Huang, Q., Cukier, J., Kobayashi, H., Liu, B., & Zhang, J. (2003). Fast authenticated key establishment protocols for self-organizing sensor networks. In Proceedings of 2nd ACM International Conference on Wireless Sensor Networks and Applications (pp. 141–150).Google Scholar
  22. 22.
    Louta M., Michalas A., Anagnostoupoulos I., Vergados D. (2009) Trust management framework for intelligent agent negotiations in ubiquitous computing environments. Telecommnucation Systems 41(2): 141–157CrossRefGoogle Scholar
  23. 23.
    Malan, D., Welsh, M., & Smith, M. (2004). A public-key infrastructure for key distribution in tinyOS based on elliptic curve cryptography. In Proceedings of the 1st IEEE international conference on sensor and ad hoc communications and networks (pp. 71–80).Google Scholar
  24. 24.
    Kotzanikolaou P., Magkos E., Vergados D., Stefanidakis M. (2009) Secure and practical key establishment for distributed sensor networks. Security and Communication Networks 2(6): 595–610Google Scholar
  25. 25.
    Zhang Y., Liu W., Lou W., Fang Y. (2006) Location-based security mechanisms in wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2): 247–260CrossRefGoogle Scholar
  26. 26.
    Advanced Encryption Standard, http://csrc.nist.gov/archieve/aes/.
  27. 27.
    Standards for efficient cryptography (SECG), SEC1: Elliptic curve cryptography version 2.0, http://www.secg.org/download/aid-780/sec1-v2.pdf.

Copyright information

© Springer Science+Business Media, LLC. 2010

Authors and Affiliations

  1. 1.Department of Information and Electronic CommerceKainan UniversityLuzhuTaiwan, R.O.C.
  2. 2.Department of Information Engineering and Computer ScienceFeng Chia UniversitySeatwen, TaichungTaiwan, R.O.C.

Personalised recommendations