Skip to main content
Erschienen in: Electronic Commerce Research 2/2018

04.08.2016

A secure and efficient payment protocol based on ElGamal cryptographic algorithms

verfasst von: Constantin Popescu

Erschienen in: Electronic Commerce Research | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper we present a secure and efficient transaction protocol that provides the anonymity and can detect the double spending. The proposed payment system is based on the ElGamal encryption scheme, the ElGamal signature scheme and the ElGamal blind signature protocol. We show that our transaction protocol is secure and efficient. We give the definitions of unlinkability and unforgeability of our security model and we prove that the proposed transaction protocol is unforgeable and satisfies the unlinkability property. We show that the proposed system is more efficient, in terms of the computation and communication cost, than the compared payment systems (Eslami et al. in Electron Commer Res Appl 10:59–66, 2011; Chen et al. in Electron Commer Res Appl 10:279–287, 2011; Liu et al. in Proceedings of second European PKI workshop: research and applications. Lecture notes in computer science, vol 3545, pp 206–214, 2005 and Chen et al. in Electron Commer Res Appl 10:673–682, 2011) for a customer who withdraws and spends an e-coin and for the merchant who verifies an electronic coin. Also, the proposed e-cash system is useful for the electronic transactions when the connection between the bank and the merchant is not available during the payment protocol. This means a less bandwidth of the payment protocol and then increases the speed of the electronic transaction.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bertoni, G., Breveglieri, L., Chen, L., Fragneto, P., Harrison, K., & Pelosi, G. (2008). A pairing SW implementation for smart-cards. J Syst Softw, 81(7), 1240–1247.CrossRef Bertoni, G., Breveglieri, L., Chen, L., Fragneto, P., Harrison, K., & Pelosi, G. (2008). A pairing SW implementation for smart-cards. J Syst Softw, 81(7), 1240–1247.CrossRef
2.
Zurück zum Zitat Camenisch, J., Piveteau, J. M., Stadler, M. (1995). Blind signatures based on the discrete logarithm problem. In A. De Santis (Ed.), Proceedings of EUROCRYPT ’94, Lecture notes in computer science, vol. 950, (pp. 428–432). Berlin: Springer. Camenisch, J., Piveteau, J. M., Stadler, M. (1995). Blind signatures based on the discrete logarithm problem. In A. De Santis (Ed.), Proceedings of EUROCRYPT ’94, Lecture notes in computer science, vol. 950, (pp. 428–432). Berlin: Springer.
3.
Zurück zum Zitat Camenisch, J., Hohenberger, S., Lysyanskaya, A. (2005). Compact e-cash. In R. Cramer (Ed.), Proceedings of EuroCrypt’2005, Lecture notes in computer science, vol. 3494, (pp. 302–321). Berlin: Springer. Camenisch, J., Hohenberger, S., Lysyanskaya, A. (2005). Compact e-cash. In R. Cramer (Ed.), Proceedings of EuroCrypt’2005, Lecture notes in computer science, vol. 3494, (pp. 302–321). Berlin: Springer.
4.
Zurück zum Zitat Canard, S., Gouget, A. (2007). Divisible e-cash systems can be truly anonymous. In S. Canard & A. Gouget (Eds.), Proceedings of EUROCRYPT 2007, Lecture notes in computer science, vol. 4515, (pp. 482–497). Berlin: Springer. Canard, S., Gouget, A. (2007). Divisible e-cash systems can be truly anonymous. In S. Canard & A. Gouget (Eds.), Proceedings of EUROCRYPT 2007, Lecture notes in computer science, vol. 4515, (pp. 482–497). Berlin: Springer.
5.
Zurück zum Zitat Chang, T., Hwang, M., & Yang, W. (2012). Cryptanalysis on an improved version of ElGamal-like public-key encryption scheme for encrypting large messages. Informatica, 23(4), 537–562. Chang, T., Hwang, M., & Yang, W. (2012). Cryptanalysis on an improved version of ElGamal-like public-key encryption scheme for encrypting large messages. Informatica, 23(4), 537–562.
6.
Zurück zum Zitat Chaum, D. (1983). Blind signature for untraceable payments. In T. Beth (Ed.), Proceedings of Eurocrypt’82, Lecture notes in computer science, (pp. 199–203). New York: Plenum Press. Chaum, D. (1983). Blind signature for untraceable payments. In T. Beth (Ed.), Proceedings of Eurocrypt’82, Lecture notes in computer science, (pp. 199–203). New York: Plenum Press.
7.
Zurück zum Zitat Chaum, D., Fiat, A., Naor, M. (1990) . Untraceable electronic cash. In S. Goldwasser (Ed.), Proceedings of the Crypto’88, Lecture notes in computer science, vol. 403, (pp. 319–327). Berlin: Springer. Chaum, D., Fiat, A., Naor, M. (1990) . Untraceable electronic cash. In S. Goldwasser (Ed.), Proceedings of the Crypto’88, Lecture notes in computer science, vol. 403, (pp. 319–327). Berlin: Springer.
8.
Zurück zum Zitat Chen, C. L., & Liao, J. J. (2011). A fair online payment system for digital content via subliminal channel. Electron Commer Res Appl, 10(3), 279–287.CrossRef Chen, C. L., & Liao, J. J. (2011). A fair online payment system for digital content via subliminal channel. Electron Commer Res Appl, 10(3), 279–287.CrossRef
9.
Zurück zum Zitat Chen, Y., Chou, J. S., Sun, H. M., & Cho, M. H. (2011). A novel electronic cash system with trustee-based anonymity revocation from pairing. Electron Commer Res Appl, 10(6), 673–682.CrossRef Chen, Y., Chou, J. S., Sun, H. M., & Cho, M. H. (2011). A novel electronic cash system with trustee-based anonymity revocation from pairing. Electron Commer Res Appl, 10(6), 673–682.CrossRef
10.
Zurück zum Zitat De Santis, A., Ferrara, A. L., & Masucci, B. (2007). An attack on a payment scheme. Inf Sci, 178(5), 1418–1421.CrossRef De Santis, A., Ferrara, A. L., & Masucci, B. (2007). An attack on a payment scheme. Inf Sci, 178(5), 1418–1421.CrossRef
12.
Zurück zum Zitat ElGamal, T. (1985). A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Transact Inf Theor, 31(4), 469–472.CrossRef ElGamal, T. (1985). A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Transact Inf Theor, 31(4), 469–472.CrossRef
13.
Zurück zum Zitat Eslami, Z., & Talebi, M. (2011). A new untraceable off-line electronic cash system. Electron Commer Res Appl, 10(1), 59–66.CrossRef Eslami, Z., & Talebi, M. (2011). A new untraceable off-line electronic cash system. Electron Commer Res Appl, 10(1), 59–66.CrossRef
14.
Zurück zum Zitat Fan, C., & Huang, V. S. M. (2010). Provably secure integrated on/off-line electronic cash for flexible and efficient payment. IEEE Transact Syst Man Cybernetics-Part C: Appl Rev, 40(5), 567–579.CrossRef Fan, C., & Huang, V. S. M. (2010). Provably secure integrated on/off-line electronic cash for flexible and efficient payment. IEEE Transact Syst Man Cybernetics-Part C: Appl Rev, 40(5), 567–579.CrossRef
15.
Zurück zum Zitat Hankerson, D., Menezes, A., & Scott, M. (2008). Software implementation of pairings. Identity Based Cryptogr, 2, 188–206. Hankerson, D., Menezes, A., & Scott, M. (2008). Software implementation of pairings. Identity Based Cryptogr, 2, 188–206.
16.
Zurück zum Zitat Juang, W. S. (2003). A practical anonymous payment scheme for electronic commerce. Comput Math Appl, 46(12), 1787–1798.CrossRef Juang, W. S. (2003). A practical anonymous payment scheme for electronic commerce. Comput Math Appl, 46(12), 1787–1798.CrossRef
17.
Zurück zum Zitat Juang, W. S. (2007). D-cash: a flexible pre-paid e-cash scheme for date-attachment. Electron Commer Res Appl, 6(1), 74–80.CrossRef Juang, W. S. (2007). D-cash: a flexible pre-paid e-cash scheme for date-attachment. Electron Commer Res Appl, 6(1), 74–80.CrossRef
18.
Zurück zum Zitat Kugler, D., Vogt, H. (2001). Marking: a privacy protecting approach against blackmailing. In K. Kim (Ed.), Proceedings of the 4th International Workshop on practice and theory in public key cryptography, vol.1992, (pp. 137–152). Berlin: Springer. Kugler, D., Vogt, H. (2001). Marking: a privacy protecting approach against blackmailing. In K. Kim (Ed.), Proceedings of the 4th International Workshop on practice and theory in public key cryptography, vol.1992, (pp. 137–152). Berlin: Springer.
19.
Zurück zum Zitat Lee, M., Ahn, G., Kim, J., Park, J., Lee, B., Kim, K., et al. (2002). Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem. J Commun Netw, 4(2), 81–89.CrossRef Lee, M., Ahn, G., Kim, J., Park, J., Lee, B., Kim, K., et al. (2002). Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem. J Commun Netw, 4(2), 81–89.CrossRef
20.
Zurück zum Zitat Liu, K., Tsang, P., Wong, S. (2005). Recoverable and untraceable e-cash. In D. Chadwick & G. Zhao (Eds.), Proceedings of Second European PKI workshop: research and applications, Lecture notes in computer science, vol. 3545, (pp. 206–214). Berlin: Springer. Liu, K., Tsang, P., Wong, S. (2005). Recoverable and untraceable e-cash. In D. Chadwick & G. Zhao (Eds.), Proceedings of Second European PKI workshop: research and applications, Lecture notes in computer science, vol. 3545, (pp. 206–214). Berlin: Springer.
21.
Zurück zum Zitat Menezes, A., van Oorschot, P., & Vanstone, S. (1997). Handbook of applied cryptography. Boca Raton: CRC Press Inc. Menezes, A., van Oorschot, P., & Vanstone, S. (1997). Handbook of applied cryptography. Boca Raton: CRC Press Inc.
22.
Zurück zum Zitat National Institute of Standards and Technology. (2013). Digital signature standard (DSS), Federal Information Processing Standards Publication 186-4. National Institute of Standards and Technology. (2013). Digital signature standard (DSS), Federal Information Processing Standards Publication 186-4.
23.
Zurück zum Zitat National Institute of Standards and Technology. (2015). Secure hash standard, Federal Information Processing Standards Publication 180-4. National Institute of Standards and Technology. (2015). Secure hash standard, Federal Information Processing Standards Publication 180-4.
24.
Zurück zum Zitat Okamoto, T. (1995). An efficient divisible electronic cash scheme. In D. Coppersmith (Ed.), Proceedings of Crypto’95, Lecture notes in computer science, vol. 963, (pp. 302–318). Berlin: Springer. Okamoto, T. (1995). An efficient divisible electronic cash scheme. In D. Coppersmith (Ed.), Proceedings of Crypto’95, Lecture notes in computer science, vol. 963, (pp. 302–318). Berlin: Springer.
25.
Zurück zum Zitat Oros, H., & Popescu, C. (2010). A secure and efficient off-line electronic payment system for wireless networks. Int J Comput Commun Control, 5(4), 551–557.CrossRef Oros, H., & Popescu, C. (2010). A secure and efficient off-line electronic payment system for wireless networks. Int J Comput Commun Control, 5(4), 551–557.CrossRef
26.
Zurück zum Zitat Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. J Cryptol, 13(3), 361–396.CrossRef Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. J Cryptol, 13(3), 361–396.CrossRef
27.
Zurück zum Zitat Popescu, C. (2009). An anonymous mobile payment system based on bilinear pairings. Informatica, 20(4), 579–590. Popescu, C. (2009). An anonymous mobile payment system based on bilinear pairings. Informatica, 20(4), 579–590.
28.
Zurück zum Zitat Popescu, C. (2011). A secure e-cash transfer system based on the elliptic curve discrete logarithm problem. Informatica, 22(3), 395–409. Popescu, C. (2011). A secure e-cash transfer system based on the elliptic curve discrete logarithm problem. Informatica, 22(3), 395–409.
29.
Zurück zum Zitat Ramachandran, A., Zhou, Z., Huang, D. (2007). Computing cryptographic algorithms in portable and embedded devices. Proceedings of IEEE International Conference on Portable Information Devices (pp. 1–7), 25–29 March 2007. Orlando: IEEE. Ramachandran, A., Zhou, Z., Huang, D. (2007). Computing cryptographic algorithms in portable and embedded devices. Proceedings of IEEE International Conference on Portable Information Devices (pp. 1–7), 25–29 March 2007. Orlando: IEEE.
30.
Zurück zum Zitat Rivest, R. L., Shamir, A., & Adelman, L. (1978). A method for obtain digital signatures and public-key cryptosystem. Commun ACM, 21, 120–126.CrossRef Rivest, R. L., Shamir, A., & Adelman, L. (1978). A method for obtain digital signatures and public-key cryptosystem. Commun ACM, 21, 120–126.CrossRef
31.
Zurück zum Zitat Schneier, B. (1996). Applied cryptography (2nd ed.). New York: Wiley. Schneier, B. (1996). Applied cryptography (2nd ed.). New York: Wiley.
32.
Zurück zum Zitat Trolin, M. (2005). A universally composable scheme for electronic cash. Proc INDOCRYPT, 3797, 347–360. Trolin, M. (2005). A universally composable scheme for electronic cash. Proc INDOCRYPT, 3797, 347–360.
33.
Zurück zum Zitat Wang, H., Cao, J., & Zhang, Y. (2005). A flexible payment scheme and its role-based access control. IEEE Transact Knowl Data Eng, 17(3), 425–436.CrossRef Wang, H., Cao, J., & Zhang, Y. (2005). A flexible payment scheme and its role-based access control. IEEE Transact Knowl Data Eng, 17(3), 425–436.CrossRef
34.
Zurück zum Zitat Zhang, L., Zhang, F., Qin, B., & Liu, S. (2011). Provably-secure electronic cash based on certificateless partially-blind signatures. Electron Commer Res Appl, 10(5), 545–552.CrossRef Zhang, L., Zhang, F., Qin, B., & Liu, S. (2011). Provably-secure electronic cash based on certificateless partially-blind signatures. Electron Commer Res Appl, 10(5), 545–552.CrossRef
Metadaten
Titel
A secure and efficient payment protocol based on ElGamal cryptographic algorithms
verfasst von
Constantin Popescu
Publikationsdatum
04.08.2016
Verlag
Springer US
Erschienen in
Electronic Commerce Research / Ausgabe 2/2018
Print ISSN: 1389-5753
Elektronische ISSN: 1572-9362
DOI
https://doi.org/10.1007/s10660-016-9236-5

Weitere Artikel der Ausgabe 2/2018

Electronic Commerce Research 2/2018 Zur Ausgabe