Abstract
Electronic purse systems are more trusted than magnetic credit card payment systems. However, electronic purse technology is difficult and expensive to realize. Security is a major problem in payment systems, but off-line electronic payments have security gaps. Public Key Infrastructure (PKI) solutions, which are applicable with third parties included to the system, have some risks. Smart cards are not fully trusted. In this study, a low cost and easily applicable electronic purse system is proposed. The proposed solution is as trusted as its global world samples. Applying a simple user authentication method, memory protected smart cards is used without requiring microprocessor smart card security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Truman, G.E., Sandoe, K., Rifkin, T.: An empirical study of smart card technology. In: Elsevier Science B.V. Information & Management 2004, pp. 1–15 (2002)
Hwang, M.-S., Lee, C.-C., Tang, Y.-L.: A Simple Remote User Authentication Scheme. Mathematical and Computer Modeling 36, 103–107 (2002)
Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: An Efficient and Practical Solution to Remote Authentication: Smart Card. Computers & Security 21(4), 372–375 (2002)
Rankl, W., Effing, W.: Smart Card Handbook. John Wiley & Sons, Chichester (1997)
U.S. NIST, Computer Systems Lab, Secure Hash Standard, FIBS PUB 180 (May 1993)
Anderson, R.: Security Engineering. John Wiley, Chichester (2001)
Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Boneh, D., DeMillo, R., Lipton, R.: The Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997)
Corcoran, D., Sims, D., Hillhouse, B.: Smart Cards and Biometrics: Your Key to PKI. Issue 59: March 01 (1999), http://www.linuxjournal.com/article.php?sid=3013
Diffle, W., Hellman, M.E.: New Directions in Cryptography. IEEE Trans. Inform. Theory, IT 22(6), 644–654 (1976)
Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystem. Communication of the ACM 21(2), 120–126 (1978)
Kiliçh, T.: Smarts Cards in PKI (2002), http://deepnight.org/publications/smartcard-howto/smartpki.html
Ellison, C., Schneier, B.: Ten Risks of PKI: What You’re not Being Told about Public Key Infrastructure. Computer Security Journal XVI(1) (2001)
Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: A modified remote login authentication scheme based on geometric approach. The Journal of Sys. and Software 55, 287–290 (2001)
Fan, L., Li, J.-H., Zhu, H.-W.: An Enhancement of TimeStamp-based Authentication Scheme. Computers & Security 21(7), 665–667 (2002)
Tan, K., Zhu, H.: Remote password authentication scheme based on cross-product. Computer Communications 22, 390–393 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kuruoglu, M.E., Sogukpinar, I. (2003). Low Cost and Trusted Electronic Purse System Design. In: Yazıcı, A., Şener, C. (eds) Computer and Information Sciences - ISCIS 2003. ISCIS 2003. Lecture Notes in Computer Science, vol 2869. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39737-3_17
Download citation
DOI: https://doi.org/10.1007/978-3-540-39737-3_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20409-1
Online ISBN: 978-3-540-39737-3
eBook Packages: Springer Book Archive