Skip to main content

Electronic Payment Scheme Using Identity-Based Cryptography

  • Conference paper
Public Key Infrastructure (EuroPKI 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4582))

Included in the following conference series:

  • 903 Accesses

Abstract

Online electronic wallet with decentralized credential keepers is an architecture allowing users to leave most of the content of his electronic wallet at the security of his residential electronic keeper, while traveling with his mobile phone. This paper proposed a new security scheme for mobile payment using such architecture. The approach differs from the previous work in that it uses identity-based encryption for securing payment between the payer and payee, which takes full advantage of public-key cryptography while simplifies the authenticity requirements of the public keys.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jean-Paul, B., et al.: The ESPRIT project CAFE – High Security Digital Payment System. In: Gollmann, D. (ed.) Computer Security - ESORICS 1994. LNCS, vol. 875, pp. 217–230. Springer, Heidelberg (1994)

    Google Scholar 

  2. Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Chaum, D., Pedersen, T.: Wallet Databases with Observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89–105. Springer, Heidelberg (1993)

    Google Scholar 

  4. Cocks, C.: An Identity-based Encryption Scheme Based on Quadratic Residues. In: Proceeding of 8th IMA International Conference on Cryptography and Coding, pp. 26–28 (2001)

    Google Scholar 

  5. Gemplus. http://www.gemplus.com

  6. Gjerde, M., et al.: Decentralized Credentials. In: Proceedings of the Seventh Nordic Workshop on Secure IT Systems, NORDSEC, pp. 151–159 (2003)

    Google Scholar 

  7. GSM Association. www.gsmworld.com

  8. Hernandez, R., Mjølsnes, S.F.: E-wallet Software Architecture with Decentralized Credentials, Norsk Informatikkonferanse, NIK (2003)

    Google Scholar 

  9. Hwu, J.-S., et al.: An Efficient Identity-based Cryptosystem for End-to-End Mobile Security. IEEE Transactions on Wireless Communications 5(9), 2586–2593 (2006)

    Article  Google Scholar 

  10. Hwu, J.-S, et al.: End-to-End Security Mechanisms for SMS. International Journal of Security and Networks 1(3/4), 177–183 (2006)

    Article  Google Scholar 

  11. Menezes, A.J.: Elliptic Curve Public Key Cryptosystems. Springer, Heidelberg (1993)

    MATH  Google Scholar 

  12. Mjølsnes, S.F, Rong, C.: On-Line E-Wallet System with Decentralized Credential Keepers. Mobile Networks and Applications 8, 87–99 (2003)

    Article  Google Scholar 

  13. Mont, M.C, et al.: A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology in a Health Care Trial. In: Mařík, V., Štěpánková, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, vol. 2736, pp. 432–437. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  14. Organization for Economic Co-operation and Development. OECD Key ICT Indicators (2006), www.oecd.org

  15. Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  16. Steinsholt, V.: Software Architecture for On-line Electronic Wallet, Master Thesis, Department of Telematics, Norwegian University of Science and Technology (2003)

    Google Scholar 

  17. Voltage Security. http://www.voltage.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Javier Lopez Pierangela Samarati Josep L. Ferrer

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nguyen, S.T., Rong, C. (2007). Electronic Payment Scheme Using Identity-Based Cryptography. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds) Public Key Infrastructure. EuroPKI 2007. Lecture Notes in Computer Science, vol 4582. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73408-6_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73408-6_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73407-9

  • Online ISBN: 978-3-540-73408-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics