Design of ECSEPP: Elliptic Curve Based Secure E-cash Payment Protocol

  • Aditya Bhattacharyya
  • S. K. Setua
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 44)


The present scenario in the area of e-commerce the most popular term is E-cash. E-cash is developed to allow fully anonymous secure electronic cash transfer to support online trading between buyers and sellers. E-cash transfer system has helped us to make transaction electronically. In this paper we propose an elliptic curve based secure e-cash payment protocol. The proposed system secures the transactions not only by the nature of the curve but also makes use of the hash function to enhance the desired security measure. It also ensures mutual authentication, anonymity, non-repudiation and traceability of the users.


Elliptic curve cryptography (ECC) Payment gateway E-commerce E-cash 


  1. 1.
    Abad-Peiro, J.L., Asokan, N., Steiner, M., Waidner, M.: Designing a generic payment service. IBM Syst. Res. J. 37(1), 72–88 (1998)Google Scholar
  2. 2.
    Chaum, D.: Blind signature for untraceable payments. In: Proceedings of Eurocrypt’82, Plenum, New York, pp. 199–203 (1983)Google Scholar
  3. 3.
    Bellare, M., Garay, J.A., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Herreweghen, E.V., Waidner, M.: Design, implementation, and deployment of the ikp secure electronic payment system. IEEE J. Sel. Areas Commun. 18(4), 611–627 (2000)CrossRefGoogle Scholar
  4. 4.
    Kungpisdan, S.: Design and analysis of secure mobile payment systems. PhD thesis, Monash University (2005)Google Scholar
  5. 5.
    Tellez, J., Sierra, J.: Anonymous payment in a client centric model for digital ecosystem. In: IEEE DEST, pp. 422–427 (2007)Google Scholar
  6. 6.
    Xing, H., Li, F., Qin, Z.: A provably secure proxy signature scheme in certificate less cryptography. Informatica 21(2), 277–294 (2010)MathSciNetGoogle Scholar
  7. 7.
    Liu, J., Huang, S.: Identity-based threshold proxy signature from bilinear pairings. Informatica 21(1), 41–56 (2010)MathSciNetMATHGoogle Scholar
  8. 8.
    Raulynaitis, A., Sakalauskas, E., Japertas, S.: Security analysis of asymmetric cipher protocol based on matrix decomposition problem. Informatica 21(2), 215–228 (2010)MathSciNetMATHGoogle Scholar
  9. 9.
    Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203–209 (1987)MathSciNetCrossRefMATHGoogle Scholar
  10. 10.
    Chou, J.S., Chen, Y.-L., Cho, M.-H., Sun, H.-M.: A novel ID-based electronic cash system from pairings. In: Cryptology ePrint Archive, Report 2009/339 (2009).
  11. 11.
    Au, M., Susilo, W., Mu, Y.: Practical anonymous divisible e-cash from bounded accumulators. In: Proceedings of Financial Cryptography and Data Security, LNCS, vol. 5143, pp. 287–301. Berlin (2008)Google Scholar
  12. 12.
    Canard, S., Gouget, A.: Divisible e-cash systems can be truly anonymous. In: Proceedings of EUROCRYPT 2007, Lecture Notes in Computer Science, vol. 4515, , pp. 482–497. Springer, Berlin (2007)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Vidyasagar UniversityMidnaporeIndia
  2. 2.University of CalcuttaKolkataIndia

Personalised recommendations