Abstract
Online electronic wallet with decentralized credential keepers is an architecture allowing users to leave most of the content of his electronic wallet at the security of his residential electronic keeper, while traveling with his mobile phone. This paper proposed a new security scheme for mobile payment using such architecture. The approach differs from the previous work in that it uses identity-based encryption for securing payment between the payer and payee, which takes full advantage of public-key cryptography while simplifies the authenticity requirements of the public keys.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jean-Paul, B., et al.: The ESPRIT project CAFE – High Security Digital Payment System. In: Gollmann, D. (ed.) Computer Security - ESORICS 1994. LNCS, vol. 875, pp. 217–230. Springer, Heidelberg (1994)
Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Chaum, D., Pedersen, T.: Wallet Databases with Observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89–105. Springer, Heidelberg (1993)
Cocks, C.: An Identity-based Encryption Scheme Based on Quadratic Residues. In: Proceeding of 8th IMA International Conference on Cryptography and Coding, pp. 26–28 (2001)
Gemplus. http://www.gemplus.com
Gjerde, M., et al.: Decentralized Credentials. In: Proceedings of the Seventh Nordic Workshop on Secure IT Systems, NORDSEC, pp. 151–159 (2003)
GSM Association. www.gsmworld.com
Hernandez, R., Mjølsnes, S.F.: E-wallet Software Architecture with Decentralized Credentials, Norsk Informatikkonferanse, NIK (2003)
Hwu, J.-S., et al.: An Efficient Identity-based Cryptosystem for End-to-End Mobile Security. IEEE Transactions on Wireless Communications 5(9), 2586–2593 (2006)
Hwu, J.-S, et al.: End-to-End Security Mechanisms for SMS. International Journal of Security and Networks 1(3/4), 177–183 (2006)
Menezes, A.J.: Elliptic Curve Public Key Cryptosystems. Springer, Heidelberg (1993)
Mjølsnes, S.F, Rong, C.: On-Line E-Wallet System with Decentralized Credential Keepers. Mobile Networks and Applications 8, 87–99 (2003)
Mont, M.C, et al.: A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology in a Health Care Trial. In: MaÅ™Ãk, V., Å tÄ›pánková, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, vol. 2736, pp. 432–437. Springer, Heidelberg (2003)
Organization for Economic Co-operation and Development. OECD Key ICT Indicators (2006), www.oecd.org
Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Steinsholt, V.: Software Architecture for On-line Electronic Wallet, Master Thesis, Department of Telematics, Norwegian University of Science and Technology (2003)
Voltage Security. http://www.voltage.com/
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nguyen, S.T., Rong, C. (2007). Electronic Payment Scheme Using Identity-Based Cryptography. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds) Public Key Infrastructure. EuroPKI 2007. Lecture Notes in Computer Science, vol 4582. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73408-6_24
Download citation
DOI: https://doi.org/10.1007/978-3-540-73408-6_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73407-9
Online ISBN: 978-3-540-73408-6
eBook Packages: Computer ScienceComputer Science (R0)