Abstract
The micropayment scheme is widely used in the electronic payment, where the transaction value is tiny, meanwhile, the number of transactions is very huge. Recently, Liu and Yan proposed a lightweight micropayment scheme to achieve the efficiency, the fairness, and the privacy. However, the bank in the Liu–Yan’s scheme maybe obtain the illegal benefits by controlling the selective result. In this paper, an enhanced fairness micropayment scheme is presented to resist the attack from the malicious bank. In addition, considering that most of the users have no motivation to verify the result due to the tiny transaction value, the observers are employed to audit the process for ensuring the fairness.

Similar content being viewed by others
References
Tsiakis, T., & Sthephanides, G. (2005). The concept of security and trust in electronic payments. Computers and Security, 22, 10–15.
Kima, C., Taoa, W., Shinb, N., & Kima, K. (2010). An empirical study of customers’ perceptions of security and trust in e-payment systems. Electronic Commerce Research and Applications, 9, 84–95.
Wen, X., Chen, Y., & Fang, J. (2013). An inter-bank e-payment protocol based on quantum proxy blind signature. Quantum Information Processing, 12(1), 549–558.
Yang, C., & Wu, C. (2013). MSRC: Micropayment scheme with ability to return changes. Mathematical and Computer Modelling, 58(1–2), 96–107.
Rivest, R. (1997). Electronic lottery tickets as micropayments. In Proceedings FC’97, LNCS (vol. 1318, pp. 307–314).
He, D., Zeadally, S., & Wu, L. (2015). Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal,. doi:10.1109/JSYST.2015.2428620.
Fu, Z., Sun, X., Liu, Q., Zhou, L., & Shu, J. (2015). Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, E98-B(1), 190–200.
Xia, Z., Wang, X., Sun, X., & Wang, Q. (2015). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.
Fun, T., Beng, L., & Razali, M. (2013). Review of mobile macro-payment schemes. Journal of Advances in Computer Networks, 1, 323–328.
Yen, S., Lin, H., Chen, Y., Hung, J., & Wu, J. (2014). Paystar: a denomination flexible micropayment scheme. Information Sciences, 259, 160–169.
Daza, V., & Lombardi, F. (2015). Frodo: Fraud resilient device for off-line micropayment. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2015.2432813.
Isern-Deyà, A., Payeras-Capellà, M., & Mut-Puigserver, M. (2013). Micropayment proposal with formal verification using coloured petri nets and performance analysis on the android platform. International Journal of Business Intelligence and Data Mining, 8(1), 74–104.
Rotger, L., Capellà, M., & Puigserver, M. (2012). Anonymous, fair and untraceable micropayment scheme: Application to LBS. IEEE on Latin America Transactions, 10, 1774–1784.
Chitra, K., & Kumar, G. (2012). Implication of secure micropayment system using process oriented structural design by hash chaining in mobile network. International Journal of Computer Science Issues, 9, 329–339.
Rivest, R. L., & Shamir, A. (1997). Payword and micromint: Two simple micropayment schemes. In Security Protocols, (Vol. 1189, pp. 69–87). Berlin: Springer.
He, D., Zeadally, S., Kumar, N., & Lee, J. (2016). Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal,. doi:10.1109/JSYST.2016.2544805.
He, D., Kumar, N., Shen, H., & Lee, J. (2016). One-to-many authentication for access control in mobile pay TV systems. Science China-Information Sciences, 59(5), 1–14. doi:10.1007/s11432-015-5469-5.
Micali, S., & Rivest, R. L. (2002). Micropayment revisited. In Topics in Cryptology — CT-RSA 2002 (Vol. 2271, pp. 149–163). Berlin: Springer.
Liu, Y., & Yan, J. (2013). A lightweight micropayment scheme based on lagrange interpolation formula. Security and Communication Networks, 6(6), 955–960.
Li, G., Wang, H., & Chai, X. (2014). An efficient micro-payment protocol based on a single hash chain. Applied Mechanics and Materials, 511, 1167–1171.
Fan, C., Liang, Y., & Wu C. (2011). An anonymous fair offline micropayment scheme. In Information Society, 2011 International Conference on IEEE (pp. 377–381).
Mullen, G., & Mummert, C. (2007). Finite fields and applications. Providence: American Mathematical Society.
Martínez-Peláez, R., Toral-Cruz, H., Ruiz, J., et al. (2015). P2PM-pay: Person to person mobile payment scheme controlled by expiration date. Wireless Personal Communications, 85(1), 289–304.
Chowdhury, A., & Koval, D. (2009). Power distribution system reliability: Practical methods and applications. Hoboken: Wiley-IEEE.
Kremer, S., Ryan, M., Smyth, B. (2010). Election verifiability in electronic voting protocols. In LNCS (vol. 6345, pp. 389–404).
Liu, Y., Hu, L., & Liu, H. (2006). A micropayment scheme based on weighted multi-dimensional hash chain. Journal of Electronics (China), 23, 791–794.
Acknowledgments
This work was supported by National Natural Science Foundation of China (Nos. 61363069, 61301166, 61363030, 61262030, U1501252, 61662016), Innovation Project of Guangxi Graduate Education (No. YCSZ2015149), and Innovation Project of GUET Graduate Education (No. 2016YJCX44).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, Y., Zhao, Q., Liu, G. et al. A Fairness-Enhanced Micropayment Scheme. Wireless Pers Commun 96, 5267–5278 (2017). https://doi.org/10.1007/s11277-016-3740-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3740-8