Abstract
With the explosive growth of mobile communications, users may often access value-added services through foreign service providers. These providers will interact directly with users, later providing details to a user’s home service provider regarding the services rendered; the home service provider, in turn, bills the user. One critical concern is that the foreign service provider might inflate the usage figures it furnishes to the home service provider. In this paper, we address this issue using a microcredit scheme. The scheme is efficient as the verification time required by the home service provider is only logarithmic in the number of microcredit transactions, and the verification time required by the foreign service provider is constant. Moreover, the communication complexity per microcredit transaction between the user and foreign service provider is also constant. The scheme uses QuasiModo trees, which have been previously applied to certificate revocation. It improves upon previous chain-based proposals and their tree-based analogues. As a byproduct, our scheme yields a micropayment protocol which is an improvement over tree schemes with respect to both communication complexity and time complexity (in both cases by a factor of approximately 2, amortized).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R., Manifavas, H., Sutherland, C.: A Practical Electronic Cash System. Manuscript (1995)
Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, p. 255. Springer, Heidelberg (2000)
Damgård, I.: A Design Principle for Hash Functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416–427. Springer, Heidelberg (1990)
Elwailly, F., Gentry, C., Ramzan, Z.: QuasiModo: Efficient Certificate Validation and Revocation. In: Proc. of Public-Key Cryptography 2004 (2004)
Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM Journal on Computing 17(2), 281–308 (1988)
Jakobsson, M., Hubaux, J.-P., Buttyan, L.: A Micropayment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks. In: Proc. of Financial Cryptography 2003 (2003)
Jakobsson, M., Leighton, T., Micali, S., Szydlo, M.: Fractal Merkle Tree Representation and Traversal. In: Proc. of the Cryptographer’s Track, RSA Conference (2003)
Jarecki, S., Odlyzko, A.: An Efficient Micropayment System Based on Probabilistic Polling. In: Proc. of Financial Cryptography 1997 (1997)
Jutla, C., Yung, M.: PayTree: Amortized Signatures for flexible Micropayments. In: Proc. of USENIX workshop on Electronic Commerce (1996)
Labaton, S.: MCI Faces Federal Fraud Inquiry on Fees for Long-Distance Calls. New York Times (July 27, 2003)
Lipton, R.J., Ostrovsky, R.: Micro-Payments via Efficient Coin Flipping. In: Proc. of Financial Cryptography 1998 (1998)
Merkle, R.: One-way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428–446. Springer, Heidelberg (1990)
Merkle, R.: Protocols for Public-Key Cryptography. In: Proc. IEEE Symposium on Security and Privacy (1980)
National Institute of Standards. FIPS 180-1: Secure Hash Standard (1995)
Pedersen, T.: Electronic Payments of Small Amounts. In: Proc. of Security Protocols Workshop (1996)
Pedersen, T.: Electronic Payments of Small Amounts. Technical Report 495, DAIMI PD, Aarhus University (August 1995)
Pierce, M., O’Mahony, D.: Micropayments for Mobile Networks. In: Proceedings of European Wireless (1999)
Rivest, R.L.: Electronic Lottery Tickets as Micropayments. In: Proc. of Financial Cryptography 1997 (1997)
Rivest, R.L., Shamir, A.: PayWord and MicroMint–Two Simple Micropayment Schemes. In: Proc. of Security Protocols Workshop (1996); CryptoBytes (RSA Laboratories), 2(1) (1996)
Tewari, H., O’Mahony, D.: Multiparty Micropayments for Ad-Hoc Networks. In: Proc. of IEEE Wireless Communications and Networking Conference 2003 (2003)
Tewari, H., O’Mahony, D.: Real-Time Payments for Mobile IP. IEEE Communications 41(2), 126–136 (2003)
Wheeler, D.: Transactions Using Bets. In: Proc. Security Protocols Workshop (1996)
Zhou, J., Lam, K.-Y.: Undeniable Billing in Mobile Communication. In: Proc. of MOBICOM (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gentry, C., Ramzan, Z. (2004). Microcredits for Verifiable Foreign Service Provider Metering. In: Juels, A. (eds) Financial Cryptography. FC 2004. Lecture Notes in Computer Science, vol 3110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27809-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-27809-2_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22420-4
Online ISBN: 978-3-540-27809-2
eBook Packages: Springer Book Archive