A Secure and Efficient Micropayment System

  • Anne Nguyen
  • Xiang Shao


In this paper, we analyze some key issues concerning systems for processing Internet micropayments. At the heart of the matter is the trade-off between security and cost considerations. A set of criteria is proposed, against which a number of previously proposed and currently operational micropayment systems are reviewed. We also propose a model, called WebCoin, embodying a number of innovations that may enhance micropayment systems currently in use.


Hash Function Credit Card Smart Card Hash Operation Electronic Payment System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    RSA Laboratories (2007) “What Are Micropayments”, RSA Security Crypto FAQ, Chapter 4 Applications of Cryptography: 4.2 Electronic Commerce. Retrieved: 19 Oct, 2007, from Scholar
  2. [2]
    Micali, S and Rivest, R. (2002) “Micropayments Revisited”, in Preneel, B. (ed.), Progress in Cryptology — CT-RSA 2002, vol. 2271 of Lecture Notes in Computer Science, Springer Verlag, Heidelberg, pp. 149-163.Google Scholar
  3. [3]
    O’Mahony, D., et al. (2001) Electronic Payment Systems for E-Commerce. 2nd edition, Artech House.Google Scholar
  4. [4]
    Stallings, W. (1999) Cryptography and Network Security, Principles and Practice. 2nd edition, Upper Saddle River, N.J. Prentice Hall.Google Scholar
  5. [5]
    Centeno, C. (2002) “Building security and consumer trust in Internet payment - The potential of soft measures". Background paper No. 7 of the Electronic Payment Systems Observatory (ePSO) project, Institute for Prospective Technological Studies (IPTS), Joint Research Centre (JRC), European Commission.Google Scholar
  6. [6]
    Kniberg, H. (2002) “What Makes a Micropayment Solution Succeed”. Masters Thesis KTH, Institution for Applied Information Technology, Stockholm, November.Google Scholar
  7. [7]
    Glassman, S., et al. (1995) “Millicent Protocol for Inexpensive Electronic Commerce”, World Wide Web Journal, vol. 1, no. 1, pp.603-618.Google Scholar
  8. [8]
    Manasse, M. (1995) “The Millicent Protocols for Electronic Commerce”, in Proceedings of the First USENIX Workshop on Electronic Commerce, USENIX press, New York, pp.117-123.Google Scholar
  9. [9]
    Sirbu, M. and Tygar, J.D. (1995) “NetBill: An Internet Commerce System Optimised for Network Delivered Services”, IEEE Personal Communication, vol. 2, no. 4, pp. 34-39.CrossRefGoogle Scholar
  10. [10]
    Cox, B., Tygar, J. D., and Sirbu, M. (1995) “NetBill Security and Transaction Protocol”, in Proceedings of the First USENIX Workshop on Electronic Commerce, USENIX press, New York, pp. 77-88.Google Scholar
  11. [11]
    Rivest, R. and Shamir, A. (1996) “PayWord and MicroMint: Two Simple Micropayment Schemes”, in Proceedings of the Fourth Cambridge workshop on Security Protocols, Cambridge, pp. 69-87.Google Scholar
  12. [12]
    Anderson, R., Manifavas, C., and Sutherland, C. (1996) “NetCard – A Practical Electronic Cash System”, in Cambridge Workshop on Security Protocols. Springer-Verlag, LNCS.Google Scholar
  13. [13]
    Hauser, R., Steiner, M., and Waidner, M. (1996) “Micro-payments Based on iKP”, Technical Report RZ 2791, IBM Research. [17] Bielski, L. (2005) “A New Shot for Micropayments". ABA Banking Journal, Vol. 97, pp 27-30.Google Scholar
  14. [14]
    Poutanen, T. J, Hinton, H. and Stumm, M. (1998) “NetCents: A Lightweight Protocol for Secure Micropayments”, in Proceedings of the Third USENIX Workshop on Electronic Commerce. USENIX press, Massachusetts, pp. 25-36.Google Scholar
  15. [15]
    Dai, X. and Grundy, J. (2007) “NetPay: An off-line, decentralized micro-payment system for thin-client applications”. Electronic Commerce Research and Applications, volume 6, pp. 91-101.CrossRefGoogle Scholar
  16. [16]
    McBride, J. (2003) “BitPass: A New Way To Pay And Charge For Online Access". Revenue strategies, Central Coast Communication, Inc. Retrieved 29 Jan, 2007, from Scholar
  17. [17]
    Bielski, L. (2005) “A New Shot for Micropayments”. ABA Banking Journal, Vol. 97, pp 27-30.Google Scholar
  18. [18]
    Rivest, R. (2004) “PepperCoin Micropayments”. In Proceedings of Financial Cryptography, Springer, Key West, USA, Feburary. Retrieved 16 Dec, 2006, from Scholar
  19. [19]
    Rivest, R (1997) “Electronic Lottery Tickets as Micropayments". In Proceedings of the First Financial Cryptography Conference (FC 97), Springer-Verlag, Anguilla, British West Indies, pp 145-150.Google Scholar
  20. [20]
    Jewell, M. (2004) “Credit cards enter the micropayment game”. The Associated Press, published June 28, 2004, USA Today News. Retrieved: 16 May, 2006, from Scholar
  21. [21]
    ClickandBuy (2005) “Why should you choose Click&Buy from FirstGate?”. Retrieved 1 Aug, 2007, from Scholar
  22. [22]
    Auletta, V., Blundo,C., and Cimato, S. (2006) “A Web Service Based Micro-payment System,” in Proceeding of the 11th IEEE Symposium on Computers and Communications (ISCC’06), Sardinia, Italy, pp. 328-333.Google Scholar
  23. [23]
    Lee, M.and Kim, K. (2002) “A Micro-payment System for Multiple-Shopping". In Proceedings of the Symposium on Cryptography and Information Security 2002 (SCIS 2002), Shirahama, Japan.Google Scholar
  24. [24]
    Parhonyi R., el al. (2005) “An interconnection architecture for micropayment systems”. In Proceedings of the Seventh International Conference on Electronic Commerce, Xian, China, pp.633-640.Google Scholar
  25. [25]
    Rivest, R., Shamir, A. and Addleman, L. (1978) “A Method for Obtaining Digital Signatures and Public-Key Cryptosystem”, Comm. ACM 21(2), pp.120–126.CrossRefMathSciNetMATHGoogle Scholar
  26. [26]
    Shao, X., Nguyen, A.T. and Muthukkumarasamy, V (2004) “WebCoin: A Conceptual Model of a Micropayment System”, in Proceedings of the 9th Australian World Wide Web Conference (AusWeb 04), Gold Coast, Australia, pp.322-331.Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2008

Authors and Affiliations

  • Anne Nguyen
    • 1
  • Xiang Shao
    • 1
  1. 1.School of Information TechnologyGold Coast Campus Griffith UniversityAustralia

Personalised recommendations