Advertisement

Smart Card Based Mobile Payment with Fairness Revocation Mechanism

  • Hyung-Woo Lee
  • Im-Yeong Lee
  • Dong-iK Oh
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2738)

Abstract

A mobile payment is a business driven transaction to pay for goods, services or digital content using a combination of mobile devices, mobile delivery networks, and the Internet. Secure mechanism must be provided in mobile payment system. However, the anonymity and privacy of transaction is a serious problem on existing mobile secure mechanism, because anonymity on mobile payment transaction can be misused by attacker. Therefore, we propose tamper-proof smart card based efficient secure mobile e-coins with fairness revocation mechanism.

Keywords

Service Provider Mobile User Smart Card Signature Scheme Atomic Function 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wrona, K., Schuba, M., Zavagli, G.: Mobile Payments - State of the Art and Open Problems. In: Fiege, L., Mühl, G., Wilhelm, U.G. (eds.) WELCOM 2001. LNCS, vol. 2232, pp. 88–100. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. 2.
    Zhou, J., Lam, K.-Y.: A Secure Pay-per View Scheme for Web-Based Video Service. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 315–326. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  3. 3.
    Peirce, M., O’Mahony, D.: Flexible Real-Time Payment Methods for Mobile Communications. IEEE Personal Communications, 44–55 (December 1999)Google Scholar
  4. 4.
    Tsalgatidou, A., Veijalainen, J.: Mobile Electronic Commerce: Emerging Issues. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol. 1875, pp. 477–486. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  5. 5.
    Chaum, D.: Blind Signature for Untraceable Payments. In: Advances in Cryptology - Crypto 1982. LNCS, pp. 199–203. Springer, Heidelberg (1982)Google Scholar
  6. 6.
    Camenisch, J.L., Piveteau, J.-M., Stadler, M.A.: An Efficient Fair Payment System. In: 3rd ACM Conference on Computer Communication Security, pp. 88–94. ACM Press, New York (1996)CrossRefGoogle Scholar
  7. 7.
    ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithm. IEEE Transactions on Information Theory IT-30(4), 469–472 (1985)CrossRefMathSciNetGoogle Scholar
  8. 8.
    Zhang, R., Kudoh, M., Matsuura, K., ImaiInstance, H.: Revocation of Digital Signature and Its Applications. In: The 2002 Symposium on Cryptography and Information Security Shirahama, SCIS 2002, Japan, January 29 - February 1 (2002)Google Scholar
  9. 9.
    Stadler, M., Piveteau, J.-M., Camenisch, J.: Fair Blind Signature. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 209–219. Springer, Heidelberg (1995)Google Scholar
  10. 10.
    Menezed, A.J., van Oorschot, P.C., Vanstone, S.A. (eds.): Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)Google Scholar
  11. 11.
    Schneier, B.: Applied Cryptography, 2nd edn. Wiley, Chichester (1996)Google Scholar
  12. 12.
    Petersen, H., Poupard, G.: Efficient Scalable Fair Cash with Off-line Extortion Prevention, Technical Report LIENS-97-7, Ecole Normale Superieure (May 1997)Google Scholar
  13. 13.
    Maitland, G., Boyd, C.: Fair Electronic Cash Based on a Group Signature Scheme. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 209–219. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  14. 14.
    Han, D.-G., Park, H.-Y., Park, Y.-H., Lee, S., Lee, D.H., Yang, H.-J.: A Practical Approach Defeating Blackmailing. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 119–132. Springer, Heidelberg (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Hyung-Woo Lee
    • 1
  • Im-Yeong Lee
    • 2
  • Dong-iK Oh
    • 2
  1. 1.Dept. of SoftwareHanshin UniversityOsan, GyunggiKorea
  2. 2.Div. of Information Technology EngineeringSoonchunhyang UniversityChungnamKorea

Personalised recommendations