A Secure and Efficient Micropayment System

  • Anne Nguyen
  • Xiang Shao


In this paper, we analyze some key issues concerning systems for processing Internet micropayments. At the heart of the matter is the trade-off between security and cost considerations. A set of criteria is proposed, against which a number of previously proposed and currently operational micropayment systems are reviewed. We also propose a model, called WebCoin, embodying a number of innovations that may enhance micropayment systems currently in use.




Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    RSA Laboratories (2007) “What Are Micropayments”, RSA Security Crypto FAQ, Chapter 4 Applications of Cryptography: 4.2 Electronic Commerce. Retrieved: 19 Oct, 2007, from http://www.rsa.com/rsalabs/node.asp?id=2289Google Scholar
  2. [2]
    Micali, S and Rivest, R. (2002) “Micropayments Revisited”, in Preneel, B. (ed.), Progress in Cryptology — CT-RSA 2002, vol. 2271 of Lecture Notes in Computer Science, Springer Verlag, Heidelberg, pp. 149-163.Google Scholar
  3. [3]
    O’Mahony, D., et al. (2001) Electronic Payment Systems for E-Commerce. 2nd edition, Artech House.Google Scholar
  4. [4]
    Stallings, W. (1999) Cryptography and Network Security, Principles and Practice. 2nd edition, Upper Saddle River, N.J. Prentice Hall.Google Scholar
  5. [5]
    Centeno, C. (2002) “Building security and consumer trust in Internet payment - The potential of soft measures". Background paper No. 7 of the Electronic Payment Systems Observatory (ePSO) project, Institute for Prospective Technological Studies (IPTS), Joint Research Centre (JRC), European Commission.Google Scholar
  6. [6]
    Kniberg, H. (2002) “What Makes a Micropayment Solution Succeed”. Masters Thesis KTH, Institution for Applied Information Technology, Stockholm, November.Google Scholar
  7. [7]
    Glassman, S., et al. (1995) “Millicent Protocol for Inexpensive Electronic Commerce”, World Wide Web Journal, vol. 1, no. 1, pp.603-618.Google Scholar
  8. [8]
    Manasse, M. (1995) “The Millicent Protocols for Electronic Commerce”, in Proceedings of the First USENIX Workshop on Electronic Commerce, USENIX press, New York, pp.117-123.Google Scholar
  9. [9]
    Sirbu, M. and Tygar, J.D. (1995) “NetBill: An Internet Commerce System Optimised for Network Delivered Services”, IEEE Personal Communication, vol. 2, no. 4, pp. 34-39.CrossRefGoogle Scholar
  10. [10]
    Cox, B., Tygar, J. D., and Sirbu, M. (1995) “NetBill Security and Transaction Protocol”, in Proceedings of the First USENIX Workshop on Electronic Commerce, USENIX press, New York, pp. 77-88.Google Scholar
  11. [11]
    Rivest, R. and Shamir, A. (1996) “PayWord and MicroMint: Two Simple Micropayment Schemes”, in Proceedings of the Fourth Cambridge workshop on Security Protocols, Cambridge, pp. 69-87.Google Scholar
  12. [12]
    Anderson, R., Manifavas, C., and Sutherland, C. (1996) “NetCard – A Practical Electronic Cash System”, in Cambridge Workshop on Security Protocols. Springer-Verlag, LNCS.Google Scholar
  13. [13]
    Hauser, R., Steiner, M., and Waidner, M. (1996) “Micro-payments Based on iKP”, Technical Report RZ 2791, IBM Research. [17] Bielski, L. (2005) “A New Shot for Micropayments". ABA Banking Journal, Vol. 97, pp 27-30.Google Scholar
  14. [14]
    Poutanen, T. J, Hinton, H. and Stumm, M. (1998) “NetCents: A Lightweight Protocol for Secure Micropayments”, in Proceedings of the Third USENIX Workshop on Electronic Commerce. USENIX press, Massachusetts, pp. 25-36.Google Scholar
  15. [15]
    Dai, X. and Grundy, J. (2007) “NetPay: An off-line, decentralized micro-payment system for thin-client applications”. Electronic Commerce Research and Applications, volume 6, pp. 91-101.CrossRefGoogle Scholar
  16. [16]
    McBride, J. (2003) “BitPass: A New Way To Pay And Charge For Online Access". Revenue strategies, Central Coast Communication, Inc. Retrieved 29 Jan, 2007, from http://www.digimarket.net/artman/publish/article_12.shtmlGoogle Scholar
  17. [17]
    Bielski, L. (2005) “A New Shot for Micropayments”. ABA Banking Journal, Vol. 97, pp 27-30.Google Scholar
  18. [18]
    Rivest, R. (2004) “PepperCoin Micropayments”. In Proceedings of Financial Cryptography, Springer, Key West, USA, Feburary. Retrieved 16 Dec, 2006, from http://citeseer.ist.psu.edu/676873.htmlGoogle Scholar
  19. [19]
    Rivest, R (1997) “Electronic Lottery Tickets as Micropayments". In Proceedings of the First Financial Cryptography Conference (FC 97), Springer-Verlag, Anguilla, British West Indies, pp 145-150.Google Scholar
  20. [20]
    Jewell, M. (2004) “Credit cards enter the micropayment game”. The Associated Press, published June 28, 2004, USA Today News. Retrieved: 16 May, 2006, from http://www.usatoday.com/tech/news/2004-06-28-micropay_x.htmGoogle Scholar
  21. [21]
    ClickandBuy (2005) “Why should you choose Click&Buy from FirstGate?”. Retrieved 1 Aug, 2007, from http://firstgate.com/EU/en/downloads/Vorteile.pdfGoogle Scholar
  22. [22]
    Auletta, V., Blundo,C., and Cimato, S. (2006) “A Web Service Based Micro-payment System,” in Proceeding of the 11th IEEE Symposium on Computers and Communications (ISCC’06), Sardinia, Italy, pp. 328-333.Google Scholar
  23. [23]
    Lee, M.and Kim, K. (2002) “A Micro-payment System for Multiple-Shopping". In Proceedings of the Symposium on Cryptography and Information Security 2002 (SCIS 2002), Shirahama, Japan.Google Scholar
  24. [24]
    Parhonyi R., el al. (2005) “An interconnection architecture for micropayment systems”. In Proceedings of the Seventh International Conference on Electronic Commerce, Xian, China, pp.633-640.Google Scholar
  25. [25]
    Rivest, R., Shamir, A. and Addleman, L. (1978) “A Method for Obtaining Digital Signatures and Public-Key Cryptosystem”, Comm. ACM 21(2), pp.120–126.CrossRefMathSciNetMATHGoogle Scholar
  26. [26]
    Shao, X., Nguyen, A.T. and Muthukkumarasamy, V (2004) “WebCoin: A Conceptual Model of a Micropayment System”, in Proceedings of the 9th Australian World Wide Web Conference (AusWeb 04), Gold Coast, Australia, pp.322-331.Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2008

Authors and Affiliations

  • Anne Nguyen
    • 1
  • Xiang Shao
    • 1
  1. 1.School of Information TechnologyGold Coast Campus Griffith UniversityAustralia

Personalised recommendations