Skip to main content

Fair E-Payment Protocol Based on Certificateless Signature and Authenticated Key Exchange

  • Conference paper
Information Computing and Applications (ICICA 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6377))

Included in the following conference series:

  • 1795 Accesses

Abstract

E-payment protocol allows two or more users to securely exchange e-cash and digital product among them over an open network. There are some problems in the E-payment applications of cross-domain and cross-organization scenarios because of certificate-based authentication and digital signature, like inconsistent public key certificates and a heavy certificate management burden. ID-based cryptography is adopted to solve those problems, but it suffers the key escrow issue. Certificateless cryptography has been introduced to mitigate those limitations. A certificateless signature and authenticated key exchange scheme (CL-SAKE for short) is proposed, and its security is proved in the extended random oracle model. As an application, an E-payment protocol based on the new CL-SAKE is then proposed, which achieves unforgeability and un-reusability of e-cash, customer anonymity and fair exchange.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chaum, D.: Blind signatures for untraceable payments. In: Proceedings of Crypto 1982, pp. 199–203. Springer, Heidelberg (1982)

    Google Scholar 

  2. Huang, Y.L., Shieh, S.P., Ho, F.S.: A generic electronic payment model supporting multiple merchant transactions. Compute Security 19(5), 452–465 (2000)

    Google Scholar 

  3. Boneh, D., Franklin, M.K.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Wang, C.J., Tang, Y., Li, Q.: ID-Based Fair Off-Line Electronic Cash System with Multiple Banks. Journal of Computer Science and Technology 22(3), 487–493 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  5. Chen, X., Zhang, F., Liu, S.: ID-based restrictive partially blind signatures and applications. Journal of Systems and Software 80(2), 164–171 (2007)

    Article  Google Scholar 

  6. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Lin, S.J., Liu, D.C.: An incentive-based electronic payment scheme for digital content transactions over the Internet. Journal of Network and Computer Applications 32, 589–598 (2009)

    Article  Google Scholar 

  8. Yang, J.H., Cheng, C.C.: An Efficient Fair Electronic Payment System Based Upon Non-Signature Authenticated Encryption Scheme. International Journal of Innovative Computing, Information and Control 5(11A), 3861–3873 (2009)

    MathSciNet  Google Scholar 

  9. Dahlberg, T., Mallat, N., Ondrus, J., Zmijewska, A.: Past, present and future of mobilepayments researcha literature review. Electron Comm. Res. Appl. 7(2), 165–181 (2008)

    Article  Google Scholar 

  10. Liu, Z., Hu, Y., Zhang, X., et al.: Certificateless signcryption scheme in the standard model. Information Sciences 180(1), 452–464 (2010)

    MATH  MathSciNet  Google Scholar 

  11. Zhang, L., Zhang, F., Wu, Q., Domingo-Ferrer, J.: Simulatable certificateless two-party authenticated key agreement protocol. Information Sciences 180(2), 1020–1030 (2010)

    MATH  MathSciNet  Google Scholar 

  12. Wang, S., Chen, Z., Wang, X.: A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures. In: Proceedings of IEEE International Symposium on Electronic Commerce and Security 2008, pp. 362–366. IEEE Computer Society, Los Alamitos (2008)

    Chapter  Google Scholar 

  13. Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6(4), 213–241 (2007)

    Article  Google Scholar 

  14. Ray, I., Ray, I., Natarajan, N.: An anonymous and failure resilient fair-exchange e-commerce protocol. Decision Support Systems 39(3), 267–292 (2005)

    Article  Google Scholar 

  15. Pagnia, H., Vogt, H., Gärtner, F.C.: Fair Exchange. The Computer Journal 46(1), 55–76 (2003)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, M., Wu, K., Xu, J. (2010). Fair E-Payment Protocol Based on Certificateless Signature and Authenticated Key Exchange. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds) Information Computing and Applications. ICICA 2010. Lecture Notes in Computer Science, vol 6377. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16167-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16167-4_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16166-7

  • Online ISBN: 978-3-642-16167-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics