Skip to main content

Low Cost and Trusted Electronic Purse System Design

  • Conference paper
Computer and Information Sciences - ISCIS 2003 (ISCIS 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2869))

Included in the following conference series:

  • 671 Accesses

Abstract

Electronic purse systems are more trusted than magnetic credit card payment systems. However, electronic purse technology is difficult and expensive to realize. Security is a major problem in payment systems, but off-line electronic payments have security gaps. Public Key Infrastructure (PKI) solutions, which are applicable with third parties included to the system, have some risks. Smart cards are not fully trusted. In this study, a low cost and easily applicable electronic purse system is proposed. The proposed solution is as trusted as its global world samples. Applying a simple user authentication method, memory protected smart cards is used without requiring microprocessor smart card security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Truman, G.E., Sandoe, K., Rifkin, T.: An empirical study of smart card technology. In: Elsevier Science B.V. Information & Management 2004, pp. 1–15 (2002)

    Google Scholar 

  2. Hwang, M.-S., Lee, C.-C., Tang, Y.-L.: A Simple Remote User Authentication Scheme. Mathematical and Computer Modeling 36, 103–107 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  3. Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: An Efficient and Practical Solution to Remote Authentication: Smart Card. Computers & Security 21(4), 372–375 (2002)

    Article  Google Scholar 

  4. Rankl, W., Effing, W.: Smart Card Handbook. John Wiley & Sons, Chichester (1997)

    Google Scholar 

  5. U.S. NIST, Computer Systems Lab, Secure Hash Standard, FIBS PUB 180 (May 1993)

    Google Scholar 

  6. Anderson, R.: Security Engineering. John Wiley, Chichester (2001)

    Google Scholar 

  7. Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)

    Google Scholar 

  8. Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Google Scholar 

  9. Boneh, D., DeMillo, R., Lipton, R.: The Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997)

    Google Scholar 

  10. Corcoran, D., Sims, D., Hillhouse, B.: Smart Cards and Biometrics: Your Key to PKI. Issue 59: March 01 (1999), http://www.linuxjournal.com/article.php?sid=3013

  11. Diffle, W., Hellman, M.E.: New Directions in Cryptography. IEEE Trans. Inform. Theory, IT 22(6), 644–654 (1976)

    Article  Google Scholar 

  12. Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystem. Communication of the ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  13. Kiliçh, T.: Smarts Cards in PKI (2002), http://deepnight.org/publications/smartcard-howto/smartpki.html

  14. Ellison, C., Schneier, B.: Ten Risks of PKI: What You’re not Being Told about Public Key Infrastructure. Computer Security Journal XVI(1) (2001)

    Google Scholar 

  15. Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: A modified remote login authentication scheme based on geometric approach. The Journal of Sys. and Software 55, 287–290 (2001)

    Article  Google Scholar 

  16. Fan, L., Li, J.-H., Zhu, H.-W.: An Enhancement of TimeStamp-based Authentication Scheme. Computers & Security 21(7), 665–667 (2002)

    Article  Google Scholar 

  17. Tan, K., Zhu, H.: Remote password authentication scheme based on cross-product. Computer Communications 22, 390–393 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kuruoglu, M.E., Sogukpinar, I. (2003). Low Cost and Trusted Electronic Purse System Design. In: Yazıcı, A., Şener, C. (eds) Computer and Information Sciences - ISCIS 2003. ISCIS 2003. Lecture Notes in Computer Science, vol 2869. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39737-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39737-3_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20409-1

  • Online ISBN: 978-3-540-39737-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics