Skip to main content

Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public Key

  • Conference paper
Computational Science and Its Applications – ICCSA 2009 (ICCSA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5593))

Included in the following conference series:

  • 1680 Accesses

Abstract

In this work, we present a mobile e-payment scenario where the merchant entity has important connectivity restrictions, which is only able of communicating through short distance connections (Wi-Fi or Bluetooth). To protect the exchange of messages, our work describes a payment protocol centered in the client which applies digital signature with recovery using self-certified public keys. Additionally, security aspects have been analyzed and protocol implementation specifications have been presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Isaac, J.T., Camara, J.S., Manzanares, A.I., Márquez, J.T.: Anonymous payment in a Kiosk centric model using digital signature scheme with message recovery and low computational power devices. J. Theor. Appl. Electron. Commer. Res. 1(2), 1–11 (2006)

    Google Scholar 

  2. Zhang, J., Li, H.: On the security of a digital signature with message recovery using self-certified public key. In: Proceedings: 2005 International Conference on Wireless Communications, Networking and Mobile Computing, vol. 2(23-26), pp. 1171–1174 (2005)

    Google Scholar 

  3. Isaac, J.T., Camara, J.S.: An Anonymous Account-Based Mobile Payment Protocol for a Restricted Connectivity Scenario. In: Proceedings of the 18th international Conference on Database and Expert Systems Applications. DEXA, September 3-7, pp. 688–692. IEEE Computer Society, Washington (2007)

    Google Scholar 

  4. Chang, Y., Chang, C., Huang, H.: Digital signature with recovery using slef-certified public keys without trustworthy system authority. Journal of Applied Mathematics and Computation 161(1), 211–227 (2005)

    Article  MATH  Google Scholar 

  5. Tseng, Y., Jan, J., Chien, H.: Digital signature with message recovery using self-certified public keys and its variants. Journal of Applied Mathematics and Computation 136(2-3) (2003)

    Google Scholar 

  6. Zhang, J., Zou, W., Chen, D., Wang, Y.: On the Security of a Digital Signature with Message Recovery using self-certified public key. Soft Computing in Multimedia Processing Special Issue of the Informatica Journal 29(3), 343–346 (2005)

    MATH  Google Scholar 

  7. Kungpisdan, S., Srinivasan, B., Dung Le, P.: Information Technology: Coding and Computing, 2004. In: International Conference on Proceedings ITCC 2004, vol. 1(5-7), pp. 35–39 (2004)

    Google Scholar 

  8. Abad Peiro, J.L., Asokan, N., Steiner, M., Waidner, M.: Designing a generic payment service. IBM Syst. J. 37(1998), 72–88 (1998)

    Article  Google Scholar 

  9. Girault, M.: Self-Certified Public Keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490–497. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  10. The Legion of the Bouncy Castle, The Legion of the Bouncy Castle Java cryptography API version 1.42 (2008), http://www.bouncycastle.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Viedma Astudillo, M., Téllez Isaac, J., Suarez Touceda, D., Plaza López, H. (2009). Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public Key. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2009. ICCSA 2009. Lecture Notes in Computer Science, vol 5593. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02457-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02457-3_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02456-6

  • Online ISBN: 978-3-642-02457-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics