Skip to main content

Advertisement

Log in

A Fairness-Enhanced Micropayment Scheme

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The micropayment scheme is widely used in the electronic payment, where the transaction value is tiny, meanwhile, the number of transactions is very huge. Recently, Liu and Yan proposed a lightweight micropayment scheme to achieve the efficiency, the fairness, and the privacy. However, the bank in the Liu–Yan’s scheme maybe obtain the illegal benefits by controlling the selective result. In this paper, an enhanced fairness micropayment scheme is presented to resist the attack from the malicious bank. In addition, considering that most of the users have no motivation to verify the result due to the tiny transaction value, the observers are employed to audit the process for ensuring the fairness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Tsiakis, T., & Sthephanides, G. (2005). The concept of security and trust in electronic payments. Computers and Security, 22, 10–15.

    Article  Google Scholar 

  2. Kima, C., Taoa, W., Shinb, N., & Kima, K. (2010). An empirical study of customers’ perceptions of security and trust in e-payment systems. Electronic Commerce Research and Applications, 9, 84–95.

    Article  Google Scholar 

  3. Wen, X., Chen, Y., & Fang, J. (2013). An inter-bank e-payment protocol based on quantum proxy blind signature. Quantum Information Processing, 12(1), 549–558.

    Article  MathSciNet  MATH  Google Scholar 

  4. Yang, C., & Wu, C. (2013). MSRC: Micropayment scheme with ability to return changes. Mathematical and Computer Modelling, 58(1–2), 96–107.

    Article  Google Scholar 

  5. Rivest, R. (1997). Electronic lottery tickets as micropayments. In Proceedings FC’97, LNCS (vol. 1318, pp. 307–314).

  6. He, D., Zeadally, S., & Wu, L. (2015). Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal,. doi:10.1109/JSYST.2015.2428620.

    Google Scholar 

  7. Fu, Z., Sun, X., Liu, Q., Zhou, L., & Shu, J. (2015). Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, E98-B(1), 190–200.

    Article  Google Scholar 

  8. Xia, Z., Wang, X., Sun, X., & Wang, Q. (2015). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.

    Article  Google Scholar 

  9. Fun, T., Beng, L., & Razali, M. (2013). Review of mobile macro-payment schemes. Journal of Advances in Computer Networks, 1, 323–328.

    Google Scholar 

  10. Yen, S., Lin, H., Chen, Y., Hung, J., & Wu, J. (2014). Paystar: a denomination flexible micropayment scheme. Information Sciences, 259, 160–169.

    Article  Google Scholar 

  11. Daza, V., & Lombardi, F. (2015). Frodo: Fraud resilient device for off-line micropayment. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2015.2432813.

    Google Scholar 

  12. Isern-Deyà, A., Payeras-Capellà, M., & Mut-Puigserver, M. (2013). Micropayment proposal with formal verification using coloured petri nets and performance analysis on the android platform. International Journal of Business Intelligence and Data Mining, 8(1), 74–104.

    Article  Google Scholar 

  13. Rotger, L., Capellà, M., & Puigserver, M. (2012). Anonymous, fair and untraceable micropayment scheme: Application to LBS. IEEE on Latin America Transactions, 10, 1774–1784.

    Article  Google Scholar 

  14. Chitra, K., & Kumar, G. (2012). Implication of secure micropayment system using process oriented structural design by hash chaining in mobile network. International Journal of Computer Science Issues, 9, 329–339.

    Google Scholar 

  15. Rivest, R. L., & Shamir, A. (1997). Payword and micromint: Two simple micropayment schemes. In Security Protocols, (Vol. 1189, pp. 69–87). Berlin: Springer.

  16. He, D., Zeadally, S., Kumar, N., & Lee, J. (2016). Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal,. doi:10.1109/JSYST.2016.2544805.

    Google Scholar 

  17. He, D., Kumar, N., Shen, H., & Lee, J. (2016). One-to-many authentication for access control in mobile pay TV systems. Science China-Information Sciences, 59(5), 1–14. doi:10.1007/s11432-015-5469-5.

    Article  MathSciNet  Google Scholar 

  18. Micali, S., & Rivest, R. L. (2002). Micropayment revisited. In Topics in Cryptology — CT-RSA 2002 (Vol. 2271, pp. 149–163). Berlin: Springer.

  19. Liu, Y., & Yan, J. (2013). A lightweight micropayment scheme based on lagrange interpolation formula. Security and Communication Networks, 6(6), 955–960.

    Article  Google Scholar 

  20. Li, G., Wang, H., & Chai, X. (2014). An efficient micro-payment protocol based on a single hash chain. Applied Mechanics and Materials, 511, 1167–1171.

    Google Scholar 

  21. Fan, C., Liang, Y., & Wu C. (2011). An anonymous fair offline micropayment scheme. In Information Society, 2011 International Conference on IEEE (pp. 377–381).

  22. Mullen, G., & Mummert, C. (2007). Finite fields and applications. Providence: American Mathematical Society.

    Book  MATH  Google Scholar 

  23. Martínez-Peláez, R., Toral-Cruz, H., Ruiz, J., et al. (2015). P2PM-pay: Person to person mobile payment scheme controlled by expiration date. Wireless Personal Communications, 85(1), 289–304.

    Article  Google Scholar 

  24. Chowdhury, A., & Koval, D. (2009). Power distribution system reliability: Practical methods and applications. Hoboken: Wiley-IEEE.

    Book  Google Scholar 

  25. Kremer, S., Ryan, M., Smyth, B. (2010). Election verifiability in electronic voting protocols. In LNCS (vol. 6345, pp. 389–404).

  26. Liu, Y., Hu, L., & Liu, H. (2006). A micropayment scheme based on weighted multi-dimensional hash chain. Journal of Electronics (China), 23, 791–794.

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by National Natural Science Foundation of China (Nos. 61363069, 61301166, 61363030, 61262030, U1501252, 61662016), Innovation Project of Guangxi Graduate Education (No. YCSZ2015149), and Innovation Project of GUET Graduate Education (No. 2016YJCX44).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yining Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Y., Zhao, Q., Liu, G. et al. A Fairness-Enhanced Micropayment Scheme. Wireless Pers Commun 96, 5267–5278 (2017). https://doi.org/10.1007/s11277-016-3740-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3740-8

Keywords

Navigation