A payment scheme using vouchers

  • Ernest Foo
  • Colin Boyd
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1465)

Abstract

Electronic payment schemes are traditionally based on the physical model of commerce where customers withdraw cash from bank accounts and spend it at merchants' establishments in return for goods and services. This may not be the most ideal model on which to base electronic payment. A new payment scheme using a different paradigm has been developed. Vouchers are prepared by the bank and the merchant. These are distributed to customers who can redeem them for electronic goods with the help of the bank. This new scheme requires fewer online messages to be transmitted than previous payment schemes involving electronic goods such as NetBill and thus also requires less online processing. The voucher scheme also provides some properties desired by payment schemes based on electronic coins.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Martin Abadi and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. Proceedings of the 1994 IEEE Symposium on Security and Privacy, pages 122–136, May 1994.Google Scholar
  2. 2.
    Ross Anderson and Roger Needham. Robustness Principles for Public Key Protocols. In Advances in Cryptology — Proceedings of CRYPTO '95. Springer-Verlag, 1995.Google Scholar
  3. 3.
    Mihir Bellare, Juan A. Garay, Ralf Hauser, Amir Herzberg, Hugo Krawczyk, Micheal Steiner, Gene Tsudik, and Micheal Waidner. iKP — A Family of Secure Electronic Payment Protocols. In Proceedings of the First Usenix Workshop on Electronic Commerce, New York, July 1995.Google Scholar
  4. 4.
    Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjolsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, and Michael Waidner. The ESPRIT Project CAFE — High Security Digital Payment Systems. In Computer Security — ESORICS '94, pages 217–230. Springer-Verlag, 1994.Google Scholar
  5. 5.
    Stefan Brands. Electronic Cash on the Internet. In Proceedings of the Internet Society 1995 Symposium on Network and Distributed System Security, pages 64–84, 1995.Google Scholar
  6. 6.
    David Chaum. Online Cash Checks. In Advances in Cryptology — Proceedings of EUROCRYPT '89, pages 288–301, 1989.Google Scholar
  7. 7.
    David Chaum, Amos Fiat, and Moni Naor. Untraceable Electronic Cash. In Advances in Cryptology — Proceedings of CRYPTO '88, Lecture Notes in Computer Science, pages 319–327. Springer-Verlag, 1990.Google Scholar
  8. 8.
    Benjamin Cox, J. D. Tygar, and Marvin Sirbu. NetBill Security and Transaction Protocol. In Proceedings of the First Usenix Workshop on Electronic Commerce, New York, July 1995.Google Scholar
  9. 9.
    Tony Eng and Tatsuaki Okamoto. Single-Term Divisible Electronic Coins. In Advances in Cryptology — Proceedings of EUROCRYPT '94, number 950 in Lecture Notes in Computer Science, pages 306–319. Springer-Verlag, 1995.Google Scholar
  10. 10.
    Niels Ferguson. Single Term Off-Line Coins. In Advances in Cryptology — Proceedings of EUROCRYPT '93, pages 318–328. Springer-Verlag, 1994.Google Scholar
  11. 11.
    Ernest Foo, Colin Boyd, William Caelli, and Ed Dawson. A Taxonomy of Electronic Cash Schemes. In Proceedings of IFIP/SEC '97 13th International Information Security Conference, pages 337–348. Chapman and Hall, 1997.Google Scholar
  12. 12.
    Matthew Franklin and Moti Yung. Secure and Efficient Off-Line Digital Money. In Proceedings of ICALP '93, number 700 in Lecture Notes in Computer Science, pages 265–276. Springer-Verlag, 1993.Google Scholar
  13. 13.
    VISA/MasterCard International. Secure Electronic Transaction (SET) Specification Book 1: Business Description. http://www.visa.com/cgibin/vee/sf/standard.html.Google Scholar
  14. 14.
    VISA/MasterCard International. Secure Electronic Transaction (SET) Specification Book 2: Programmer's Guide. http://www.visa.com/cgibin/vee/sf/standard.html.Google Scholar
  15. 15.
    VISA/MasterCard International. Secure Electronic Transaction (SET) Specification Book 3: Formal Protocol Definition. http://www.visa.com/cgibin/vee/sf/standard.html.Google Scholar
  16. 16.
    Markus Jakobsson and Moti Yung. Revokable and Versatile Electronic Money. In Third ACM Conference on Computer and Communications Security, pages 76–87. ACM Press, 1996.Google Scholar
  17. 17.
    Wenbo Mao. A Simple Cash Payment Technique for the Internet. In Computer Security — ESORICS '96. Springer-Verlag, 1996.Google Scholar
  18. 18.
    Gennady Medvinsky and B. Clifford Neuman. NetCash: A Design for Practical Electronic Currency on the Internet. In Proceedings of First ACM Conference on Computer and Communications Security, pages 102–196. ACM Press, 1993.Google Scholar
  19. 19.
    Tatsuaki Okamoto. An Efficient Divisible Electronic Cash Scheme. In Advances in Cryptology — Proceedings of CRYPTO '95, pages 438–451. Springer-Verlag, 1995.Google Scholar
  20. 20.
    Tatsuaki Okamoto and Kazuo Ohta. Universal Electronic Cash. In Advances in Cryptology — Proceedings of CRYPTO '91, pages 324–337. Springer-Verlag, 1992.Google Scholar
  21. 21.
    A. Shamir R. Rivest and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, pages 120–126, 1978.Google Scholar
  22. 22.
    Ronald L. Rivest and Adi Shamir. PayWord and MicroMint: Two Simple Micropayment Schemes. http://theory.lcs.mit.edu/rivest/RivestShamir-mpay.ps, January 1996.Google Scholar
  23. 23.
    Yacov Yacobi. Efficient Electronic Money. In Advances in Cryptology — Proceedings of ASIACRYPT '94, pages 153–163. Springer-Verlag, 1995.Google Scholar

Copyright information

© Springer-Verlag 1998

Authors and Affiliations

  • Ernest Foo
    • 1
  • Colin Boyd
    • 1
  1. 1.Information Security Research Centre School of Data CommunicationsQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations