Abstract
Based on concurrent signature algorithm, a fair mobile payment protocol is proposed in the paper. The protocol possesses the characters of fairness and non-repudiation. It can protect both of the consumer and merchant’s profits. As the electronic check is transferred by publishing a secret key, it guarantees that each participant could get the expected item at the same time. Compared to the traditional process, there are less transaction steps in our scheme. Moreover it can avoid network congestion caused by a traditional TTP and decrease the transaction center’s processing pressure much. It could be used for physical goods transaction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hao, W., He-qing, G.: Fair Payment Protocols for E-Commerce. In: Building the E-Service Society, vol. 146, pp. 227–245. Springer, Boston (2004)
Ray, I.: Fair exchange in e-commerce. ACM SIGecom Exchange 3(2), 9–17 (2002)
Vogt, H., Gartner, F. C., Pagnia, H.: Supporting Fair Exchange in Mobile Environments. Mobile Networks and Applications 8(2), 127–136 (2003)
Asokan, N., Shoup, V., Waidner, M.: Optimistic Fair Exchange of Digital Signatures. IEEE Journal on Selected Areas in Communication 18(4), 593–610 (2000)
Park, J., Chong, E., Siegel, H.: Constructing Fair-Exchange Protocols for E-Commerce via Distributed Computation of RSA Signatures. In: Proceedings of PODC 2003, pp. 172–181. ACM Press, New York (2003)
Zhou, J., Gollmann, D.: An Efficient Non-repudiation Protocol. In: 1997 IEEE Computer Security Foundations Workshop, pp. 126–132. IEEE Computer Society Press, Los Alamitos (1997)
Bao, F., Deng, R., Nguyen, K.Q., Varadharajan, V.: Multi-party fair exchange with an off-line trusted neutral party. In: 10th International Workshop on Database & Expert Systems Applications, pp. 858–862 (1999)
Franklin, M.K., Reiter, M.K.: Fair exchange with a semi-trusted third party. In: 4th ACM conference on Computer and Communications Security, pp. 1–5. ACM Press, New York (1997)
Zheng, D., Chen, K., You, J.: Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party. Journal of Computer Science and Technology 17(6), 749–756 (2002)
Chen, L., Kudla, C., Paterson, K.G.: Concurrent signature. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 287–305. Springer, Heidelberg (2004)
Rivest, R., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)
Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fan, W., Shu, H., Yan, Q., Wang, F. (2008). A Fair Mobile Payment Protocol. In: Ma, Y., Choi, D., Ata, S. (eds) Challenges for Next Generation Network Operations and Service Management. APNOMS 2008. Lecture Notes in Computer Science, vol 5297. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88623-5_53
Download citation
DOI: https://doi.org/10.1007/978-3-540-88623-5_53
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88622-8
Online ISBN: 978-3-540-88623-5
eBook Packages: Computer ScienceComputer Science (R0)