Skip to main content

Micropayments for Wireless Communications

  • Conference paper
  • First Online:
Book cover Information Security and Cryptology — ICISC 2000 (ICISC 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2015))

Included in the following conference series:

Abstract

Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such devices. Micropayment schemes seem well suited to this scenario since they are specifically designed for efficient operation. Most micropayment schemes require a digital signature and therefore users must support public key operations and, furthermore, a public key infrastructure must be available. Such schemes are not suitable for current wireless systems since public key technology is not supported. We examine the SVP micropayment scheme which overcomes this problem by using only symmetric key cryptography and relying on tamper resistance. Some limitations are observed in the SVP micropayment scheme and an enhanced scheme is proposed suitable for current generation wireless communications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Vijay Ahuja, Secure Commerce on the Internet, Academic Press, 1996.

    Google Scholar 

  2. Ross Anderson, Harry Manifavas, and Chris Sutherland, “A practical electronic cash system”, Personal Communication, December 1995.

    Google Scholar 

  3. ASPeCT, Initial Report on Security Requirements, AC095/ATEA/W21/ DS/P/02/B, February 1996.

    Google Scholar 

  4. ASPeCT, Secure billing: evaluation report, AC095/SAG/W25/DS/P/16/ 1, May 1997.

    Google Scholar 

  5. K. Buhanal, et al., “IMT-2000: Service Providers’ Perspective”, IEEE Personal Communications, August 1997.

    Google Scholar 

  6. Marilyn Greenstein and Todd M Feinman, Electronic Commerce: Security, Risk Management and Control, McGraw-Hill, 1999, p. 2.

    Google Scholar 

  7. G. Horn and B. Preneel, “Authentication and payment in future mobile systems”, Computer Security-ESORICS’98, Lecture Notes in Computer Science, 1485, 1998, pp. 277–293.

    Chapter  Google Scholar 

  8. Ralf Hauser, Michael Steiner, and Michael Waidner, Micro-Payments based on iKP, IBM Zurich Research Lab. Available as http://www.zurich.ibm.ch/Technology/Security/publications/1996/HSW96.ps.gz

  9. ITU, Recommendation ITU-R M.1223, Evaluation of Security Mechanisms for IMT-2000, 1997.

    Google Scholar 

  10. L. Lamport, “Password authentication with insecure communication”, Communications of the ACM, 24(11), 770–771, Nov 1981.

    Article  MathSciNet  Google Scholar 

  11. K.M. Martin and C.J. Mitchell, “Evaluation of authentication protocols for mobile environment value-added services”, Journal of Computer Security, to appear. Available online from http://isg.rhbnc.ac.uk/cjm/Chris_Mitchell.htm.

  12. A. Mehrota, GSM System Engineering, Artech House, 1997.

    Google Scholar 

  13. C.J. Mitchell, “Security in Future Mobile Networks”, Second International Workshop on Mobile Multi-Media Communications (MoMuC-2), Bristol, April 1995.Also available online at http://isg.rhbnc.ac.uk/cjm/SIFMW.ZIP.

  14. Seshadri Mohan, “Privacy and Authentication Protocols for PCS”, IEEE Personal Communications, October 1996, pp.34–38.

    Google Scholar 

  15. K.M. Martin, B. Preneel, C.J. Mitchell, H.J. Hitz, G. Horn, A. Poliakova, and P. Howard, “Secure billing for mobile information services in UMTS”,in: S. Trigila, A. Mullery, M. Campolargo, H. Vanderstraeten and M. Mampaey (eds.), Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services (Proceedings of the Fifth International Conference, IS&N 98, Antwerp, Belgium, May (1998), Springer-Verlag (LNCS 1430), pp.535–548.

    Chapter  Google Scholar 

  16. T. Ojanpera and R. Prasad, “IMT-2000 Applications”,in Wideband CDMA for Third Generation Mobile Communication, T Ojanpera and R. Prasad (ed.), Artech House, 1998, pp. 65–76.

    Google Scholar 

  17. T. P. Pedersen, “Electronic payments of small amounts”, DAIMI PB-495, Computer Science Department, Aarhus University, August 1995.

    Google Scholar 

  18. S.M. Redl et al., GSM and Personal Communications Handbook, Artech House Publishers, 1998.

    Google Scholar 

  19. R. L. Rivest and A Shamir, “PayWord and MicroMint: Two simple micropayment schemes”, Cryptobytes, Vol. 2No. 1, May 1996, pp7–11. Available from http://theory.lcs.mit.edu/~rivest

    Google Scholar 

  20. Jacques Stern and Serge Vaudenay, “SVP: a Flexible Micropayment Scheme”, Financial Crypto’ 97, pp.161–171, Springer-Verlag, 1997.

    Google Scholar 

  21. The Technical Advisory Committee to Develop a Federal Information Processing Standard for the Federal Key Management Infrastructure, Requirements for Key Recovery Products, available at http://csrc.nist.gov/keyrecovery.

  22. Peter Wayner, Digital Cash: Commerce on the Net, Academic Press, 2nd Edition, 1997.

    Google Scholar 

  23. M. Wiener, “Performance Comparison of Public-Key Cryptosystems”, Cryptobytes, Vol. 1, No. 2, RSA Laboratories, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, D., Boyd, C., Dawson, E. (2001). Micropayments for Wireless Communications. In: Won, D. (eds) Information Security and Cryptology — ICISC 2000. ICISC 2000. Lecture Notes in Computer Science, vol 2015. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45247-8_16

Download citation

  • DOI: https://doi.org/10.1007/3-540-45247-8_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41782-8

  • Online ISBN: 978-3-540-45247-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics