Abstract
E-payment protocol allows two or more users to securely exchange e-cash and digital product among them over an open network. There are some problems in the E-payment applications of cross-domain and cross-organization scenarios because of certificate-based authentication and digital signature, like inconsistent public key certificates and a heavy certificate management burden. ID-based cryptography is adopted to solve those problems, but it suffers the key escrow issue. Certificateless cryptography has been introduced to mitigate those limitations. A certificateless signature and authenticated key exchange scheme (CL-SAKE for short) is proposed, and its security is proved in the extended random oracle model. As an application, an E-payment protocol based on the new CL-SAKE is then proposed, which achieves unforgeability and un-reusability of e-cash, customer anonymity and fair exchange.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chaum, D.: Blind signatures for untraceable payments. In: Proceedings of Crypto 1982, pp. 199–203. Springer, Heidelberg (1982)
Huang, Y.L., Shieh, S.P., Ho, F.S.: A generic electronic payment model supporting multiple merchant transactions. Compute Security 19(5), 452–465 (2000)
Boneh, D., Franklin, M.K.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Wang, C.J., Tang, Y., Li, Q.: ID-Based Fair Off-Line Electronic Cash System with Multiple Banks. Journal of Computer Science and Technology 22(3), 487–493 (2007)
Chen, X., Zhang, F., Liu, S.: ID-based restrictive partially blind signatures and applications. Journal of Systems and Software 80(2), 164–171 (2007)
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)
Lin, S.J., Liu, D.C.: An incentive-based electronic payment scheme for digital content transactions over the Internet. Journal of Network and Computer Applications 32, 589–598 (2009)
Yang, J.H., Cheng, C.C.: An Efficient Fair Electronic Payment System Based Upon Non-Signature Authenticated Encryption Scheme. International Journal of Innovative Computing, Information and Control 5(11A), 3861–3873 (2009)
Dahlberg, T., Mallat, N., Ondrus, J., Zmijewska, A.: Past, present and future of mobilepayments researcha literature review. Electron Comm. Res. Appl. 7(2), 165–181 (2008)
Liu, Z., Hu, Y., Zhang, X., et al.: Certificateless signcryption scheme in the standard model. Information Sciences 180(1), 452–464 (2010)
Zhang, L., Zhang, F., Wu, Q., Domingo-Ferrer, J.: Simulatable certificateless two-party authenticated key agreement protocol. Information Sciences 180(2), 1020–1030 (2010)
Wang, S., Chen, Z., Wang, X.: A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures. In: Proceedings of IEEE International Symposium on Electronic Commerce and Security 2008, pp. 362–366. IEEE Computer Society, Los Alamitos (2008)
Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6(4), 213–241 (2007)
Ray, I., Ray, I., Natarajan, N.: An anonymous and failure resilient fair-exchange e-commerce protocol. Decision Support Systems 39(3), 267–292 (2005)
Pagnia, H., Vogt, H., Gärtner, F.C.: Fair Exchange. The Computer Journal 46(1), 55–76 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, M., Wu, K., Xu, J. (2010). Fair E-Payment Protocol Based on Certificateless Signature and Authenticated Key Exchange. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds) Information Computing and Applications. ICICA 2010. Lecture Notes in Computer Science, vol 6377. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16167-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-16167-4_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16166-7
Online ISBN: 978-3-642-16167-4
eBook Packages: Computer ScienceComputer Science (R0)