Abstract
The participating entities in an electronic payment usually include an overseeing bank as well as a customer and a merchant. Many electronic payment schemes are designed so that the bank is off-line during the actual payment between the customer and the merchant. This paper introduces the concept of passive entities which allows the protocol designer to allocate the level of processing required by an entity during a particular phase of the payment scheme. To illustrate the use of passive entities, a new electronic payment scheme is developed which has the customer assigned as the passive entity during payment. This new protocol is more efficient than similar protocols. A variation of this protocol is also described in which the identity of the customer is kept anonymous from the merchant.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abadi, M., Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. In: Proceedings of the 1994 IEEE Symposium on Security and Privacy, pp. 122–136 (1994)
Bellare, M., Garay, J.A., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Waidner, M.: iKP – A Family of Secure Electronic Payment Protocols. In: Proceedings of the First Usenix Workshop on Electronic Commerce, New York (1995)
Brands, S.: Untraceable Off-line Cash in Wallets with Observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 302–318. Springer, Heidelberg (1993)
Brands, S.: Electronic Cash on the Internet. In: Proceedings of the Internet Society 1995 Symposium on Network and Distributed System Security, pp. 64–84 (1995)
Camenisch, J., Maurer, U., Stadler, M.: Digital Payment Systems with Passive Anonymity-Revoking Trustees. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 33–34. Springer, Heidelberg (1996)
Chan, A., Frankel, Y., Tsiounis, Y.: Easy Come - Easy Go Divisible Cash. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 561–575. Springer, Heidelberg (1998)
Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)
Cox, B., Tygar, J.D., Sirbu, M.: NetBill Security and Transaction Protocol. In: Proceedings of the First Usenix Workshop on Electronic Commerce, New York (July 1995)
Eng, T., Okamoto, T.: Single-Term Divisible Electronic Coins. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 306–319. Springer, Heidelberg (1994)
Ferguson, N.: Extensions of Single Term Coins. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 292–301. Springer, Heidelberg (1993)
Foo, E., Boyd, C.: A Payment Scheme Using Vouchers. In: Hirschfeld, R. (ed.) FC 1998. E. Foo, C. Boyd, vol. 1465, pp. 103–121. Springer, Heidelberg (1998)
Franklin, M.K., Reiter, M.K.: The Design and Implementation of a Secure Auction Service. IEEE Transactions on Software Engineering 22(5), 302–312 (1996)
Freier, A.O., Karlton, P.L., Kocher, P.C.: The SSL Protocol Version 3.0. (1996), http://www.netscape.com/eng/ssl3/
VISA/MasterCard International. Secure Electronic Transaction (SET) Specification Book 1: Business Description (1997), http://www.setco.org/set_specifications.html
VISA/MasterCard International. Secure Electronic Transaction (SET) Specification Book 2: Programmer’s Guide (1997), http://www.setco.org/set_specifications.html
VISA/MasterCard International. Secure Electronic Transaction (SET) Specification Book 3: Formal Protocol Definition (1997), http://www.setco.org/set_specifications.html
Kelsey, J., Schneier, B.: Conditional purchase orders. In: Proceedings of the Fourth ACM Conference on Computer and Communications Security. ACM Press, New York (1997)
Schoenmakers, B.: Security Aspects of the EcashTM Payment System. In: Preneel, B., Rijmen, V. (eds.) State of the Art in Applied Cryptography. LNCS, vol. 1528, p. 338. Springer, Heidelberg (1998)
Stubblebine, S., Syverson, P.: Fair On-line Auctions without Special Trusted Parties. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol. 1648, p. 230. Springer, Heidelberg (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Foo, E., Boyd, C. (2000). Passive Entities: A Strategy for Electronic Payment Design. In: Dawson, E.P., Clark, A., Boyd, C. (eds) Information Security and Privacy. ACISP 2000. Lecture Notes in Computer Science, vol 1841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10718964_12
Download citation
DOI: https://doi.org/10.1007/10718964_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67742-0
Online ISBN: 978-3-540-45030-6
eBook Packages: Springer Book Archive