Skip to main content

A Private and Efficient Mobile Payment Protocol

  • Conference paper
Computational Intelligence and Security (CIS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3802))

Included in the following conference series:

Abstract

Many secure electronic payment protocols have been proposed, most of which are based on public key cryptograph. These protocols, however, are not suitable for mobile network due to the limitations of mobile environments, such as limited computation capability of mobile devices, limited bandwidth, etc. In this paper, we propose a private and efficient payment protocol for mobile network, which only involves symmetric key algorithm, such as symmetric encryption, hash function and keyed hash function. All these operations can be implemented on mobile devices feasibly. The proposed protocol also achieves completely privacy protection of buyers, which is one of the important requirements in mobile commerce. First, the identity of the buyer is protected from the merchant. Second, the transaction privacy of the buyer, such as what the buyer buys, and whom the buyer buys from, are also protected from any other parties and financial institutions. By giving a security analysis, we show that our protocol satisfies all security requirements in electronic payment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Garay, J., Hauser, R., Herzberg, A., Steiner, M., Tsudik, G., Van Herreweghen, E., Waidner, M.: Design,Implementation, and Deployment of the iKP Secure Electronic Payment system. IEEE Journal of Selected Areas in Communications 18, 611–627 (2000)

    Article  Google Scholar 

  2. Kungpisdan, S., Srinivasan, B., Phu Dung, L.: A Practical Framework for Mobile SET Payment. In: Proceedings of 2003 International E-Society Conference, pp. 321–328 (2003)

    Google Scholar 

  3. Huang, Z., Chen, K.F.: Electronic Payment in Mobile Environment. In: Proceedings of the 13th Internatinal Workshop on DEXA, pp. 413–417 (2002)

    Google Scholar 

  4. Kungpisdan, S., Srinivasan, B., Phu Dung, L.: A Secure Account-Based Mobile Payment Protocol. In: Proceedings of International Conference on Information Technology: Cod-ing and Computing, pp. 321–328 (2004)

    Google Scholar 

  5. Hu, Z.Y., Liu, Y.W., Hu, X., Li, J.H.: Anonymous Micropayments Authentication (AMA) in Mobile Data Network. In: Proceedings of IEEE INFOCOM 2004, pp. 46–53 (2004)

    Google Scholar 

  6. Fourati, A., Ayed, H.K.B., Benzekri, A.: A SET Based Approach to Secure the Payment in Mobile Commerce. In: Proceedings of 27th IEEE Conference on Local Computer Networks, pp. 136–137 (2002)

    Google Scholar 

  7. Kohl, J., Neuman, C.: The Kerberos Network Authentication Service (V5). RFC 1510 (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, C., Leung, Hf. (2005). A Private and Efficient Mobile Payment Protocol. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_153

Download citation

  • DOI: https://doi.org/10.1007/11596981_153

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30819-5

  • Online ISBN: 978-3-540-31598-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics