Advertisement

A Secure Electronic Payment Scheme for Charity Donations

  • Mansour A. Al-Meaither
  • Chris J. Mitchell
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2738)

Abstract

Although many charities have a web presence, almost all of them have been designed to accept credit cards as the only means for making donations. The anonymity requirements of many donors, however, make the existing means of donation inappropriate for them. In this paper we investigate the business need for an internet charity donation scheme, identify the security requirements such a scheme should fulfill, and propose a scheme that uses an anonymous electronic cash technique to make donations, and that employs smart cards for donation distribution. Finally, we analyse how the proposed scheme matches the identified security requirements.

Keywords

charity e-commerce security payment systems anonymity smart cards 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    ISO/IEC 9798-3. Information technology — Security techniques — Entity authentication mechanisms — Part 3: Mechanisms using asymmetric signature techniques. International Organization for Standardization, Geneva, Switzerland (1998)Google Scholar
  2. 2.
    Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology—CRYPTO 1882, pp. 199–203. Plenum Press, New York (1983)Google Scholar
  3. 3.
    Craver, S., Mathews, H. and Company: Socially engaged internet users: Prospects for online philanthropy and activism (1999), available at http://www.craveronline.com
  4. 4.
    Kugler, D., Vogt, H.: Fair tracing without trustees. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, pp. 136–148. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Oishi, K., Mambo, M., Okamoto, E.: Anonymous public key certificates and their applications. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E81-A(1), 56–64 (1998)Google Scholar
  6. 6.
    von Solms, S., Naccache, D.: On blind signatures and perfect crimes. Computers & Security 11(6), 581–583 (1992)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Mansour A. Al-Meaither
    • 1
  • Chris J. Mitchell
    • 1
  1. 1.Information Security GroupRoyal Holloway, University of LondonEgham, SurreyUnited Kingdom

Personalised recommendations