Skip to main content
Top

2016 | OriginalPaper | Chapter

Design of ECSEPP: Elliptic Curve Based Secure E-cash Payment Protocol

Authors : Aditya Bhattacharyya, S. K. Setua

Published in: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The present scenario in the area of e-commerce the most popular term is E-cash. E-cash is developed to allow fully anonymous secure electronic cash transfer to support online trading between buyers and sellers. E-cash transfer system has helped us to make transaction electronically. In this paper we propose an elliptic curve based secure e-cash payment protocol. The proposed system secures the transactions not only by the nature of the curve but also makes use of the hash function to enhance the desired security measure. It also ensures mutual authentication, anonymity, non-repudiation and traceability of the users.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Abad-Peiro, J.L., Asokan, N., Steiner, M., Waidner, M.: Designing a generic payment service. IBM Syst. Res. J. 37(1), 72–88 (1998) Abad-Peiro, J.L., Asokan, N., Steiner, M., Waidner, M.: Designing a generic payment service. IBM Syst. Res. J. 37(1), 72–88 (1998)
2.
go back to reference Chaum, D.: Blind signature for untraceable payments. In: Proceedings of Eurocrypt’82, Plenum, New York, pp. 199–203 (1983) Chaum, D.: Blind signature for untraceable payments. In: Proceedings of Eurocrypt’82, Plenum, New York, pp. 199–203 (1983)
3.
go back to reference Bellare, M., Garay, J.A., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Herreweghen, E.V., Waidner, M.: Design, implementation, and deployment of the ikp secure electronic payment system. IEEE J. Sel. Areas Commun. 18(4), 611–627 (2000)CrossRef Bellare, M., Garay, J.A., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Herreweghen, E.V., Waidner, M.: Design, implementation, and deployment of the ikp secure electronic payment system. IEEE J. Sel. Areas Commun. 18(4), 611–627 (2000)CrossRef
4.
go back to reference Kungpisdan, S.: Design and analysis of secure mobile payment systems. PhD thesis, Monash University (2005) Kungpisdan, S.: Design and analysis of secure mobile payment systems. PhD thesis, Monash University (2005)
5.
go back to reference Tellez, J., Sierra, J.: Anonymous payment in a client centric model for digital ecosystem. In: IEEE DEST, pp. 422–427 (2007) Tellez, J., Sierra, J.: Anonymous payment in a client centric model for digital ecosystem. In: IEEE DEST, pp. 422–427 (2007)
6.
go back to reference Xing, H., Li, F., Qin, Z.: A provably secure proxy signature scheme in certificate less cryptography. Informatica 21(2), 277–294 (2010)MathSciNet Xing, H., Li, F., Qin, Z.: A provably secure proxy signature scheme in certificate less cryptography. Informatica 21(2), 277–294 (2010)MathSciNet
7.
go back to reference Liu, J., Huang, S.: Identity-based threshold proxy signature from bilinear pairings. Informatica 21(1), 41–56 (2010)MathSciNetMATH Liu, J., Huang, S.: Identity-based threshold proxy signature from bilinear pairings. Informatica 21(1), 41–56 (2010)MathSciNetMATH
8.
go back to reference Raulynaitis, A., Sakalauskas, E., Japertas, S.: Security analysis of asymmetric cipher protocol based on matrix decomposition problem. Informatica 21(2), 215–228 (2010)MathSciNetMATH Raulynaitis, A., Sakalauskas, E., Japertas, S.: Security analysis of asymmetric cipher protocol based on matrix decomposition problem. Informatica 21(2), 215–228 (2010)MathSciNetMATH
10.
go back to reference Chou, J.S., Chen, Y.-L., Cho, M.-H., Sun, H.-M.: A novel ID-based electronic cash system from pairings. In: Cryptology ePrint Archive, Report 2009/339 (2009). http://eprint.iacr.org/ Chou, J.S., Chen, Y.-L., Cho, M.-H., Sun, H.-M.: A novel ID-based electronic cash system from pairings. In: Cryptology ePrint Archive, Report 2009/339 (2009). http://​eprint.​iacr.​org/​
11.
go back to reference Au, M., Susilo, W., Mu, Y.: Practical anonymous divisible e-cash from bounded accumulators. In: Proceedings of Financial Cryptography and Data Security, LNCS, vol. 5143, pp. 287–301. Berlin (2008) Au, M., Susilo, W., Mu, Y.: Practical anonymous divisible e-cash from bounded accumulators. In: Proceedings of Financial Cryptography and Data Security, LNCS, vol. 5143, pp. 287–301. Berlin (2008)
12.
go back to reference Canard, S., Gouget, A.: Divisible e-cash systems can be truly anonymous. In: Proceedings of EUROCRYPT 2007, Lecture Notes in Computer Science, vol. 4515, , pp. 482–497. Springer, Berlin (2007) Canard, S., Gouget, A.: Divisible e-cash systems can be truly anonymous. In: Proceedings of EUROCRYPT 2007, Lecture Notes in Computer Science, vol. 4515, , pp. 482–497. Springer, Berlin (2007)
Metadata
Title
Design of ECSEPP: Elliptic Curve Based Secure E-cash Payment Protocol
Authors
Aditya Bhattacharyya
S. K. Setua
Copyright Year
2016
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2529-4_35

Premium Partner