Micropayments with Privacy — a New Proposal for E-commerce

  • Krzysztof Szczypiorski
  • Aneta Zwierko
  • Igor Margasiński


This paper presents an original concept of micropayment schemes which combine both the simplicity of an electronic pre-paid card without trusted third party and user's privacy. Two protocols are proposed - the first one is based on a secure one-way hash function, the second one is based on a cryptographically secure pseudorandom bit generator. The main advantage of the proposed schemes is the ability to perform a cryptographic key distribution within the micropayment process.


micropayments e-commerce privacy 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

7. References

  1. [1]
    Boly, J-P., Bosselaers, A., Pedersen, T. et al.: The ESPRIT Project CAFE. ESORICS 94, Springer-Verlag LNCS Vol. 875 (1994) 217–230Google Scholar
  2. [2]
    Dai, X., Grundy, J.: Architecture of a Micro-payment System for Thinclient Web Applications. Proceedings of the 2002 International Conference on Internet Computing (2002)Google Scholar
  3. [3]
    Dierks T., Allen C.: The TLS-Protocol Version 1.0. IETF RFC 2246 (1999)Google Scholar
  4. [4]
    Ellis, C.: Evaluation of Micropayment Schemes. Tech Report HPL-97-14 (1997)Google Scholar
  5. [5]
    Goldberg, I., Shostack, A. Freedom Network 1.0 Architecture and Protocols. Zero-Knowledge Systems. White Paper, 1999.Google Scholar
  6. [6]
    Hauser, R., Steiner, M, Waidner, M.: Micro-Payments based on iKP. Research Report 2791 (# 89269), IBM Research (1996)Google Scholar
  7. [7]
    Jakobsson, M., Hubaux, J-P., Buttyan, L.: A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks. Financial Cryptography'03 (2003)Google Scholar
  8. [8]
    Jarecki, S., Odłyżko, A.: An Efficient Micropayment System Based on Probabilistic Polling. Financial Cryptography '97, Springer-Verlag LNCS Vol. 1318 (1998) 173–191CrossRefGoogle Scholar
  9. [9]
    Margasiński, I., Szczypiorski, K.: VAST: Versatile Anonymous System for Web Users. Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems, Springer-Verlag (2004)Google Scholar
  10. [10]
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Inc. (1997)Google Scholar
  11. [11]
    Micali, S., Rivest, R.: Micropayments Revisited. CT-RSA 2002, Springer-Verlag LNCS Vol. 2271 (2002) 149–163MathSciNetGoogle Scholar
  12. [12]
    Pedersen, T.: Electronic Payments of Small Amounts. Technical Report IDAMI PB-495 (1995)Google Scholar
  13. [13]
    Rivest, R.: Electronic Lottery Tickets as Micropayments. Financial Cryptography '97, Springer-Verlag LNCS Vol. 1318 (1998) 307–314Google Scholar
  14. [14]
    Rivest, R., Shamir, A.: PayWord and MicroMint: Two simple micropayment schemes. Proceedings of 1996 International Workshop on Security Protocols, Springer-Verlag LNCS Vol. 1189 (1997) 69–87MathSciNetGoogle Scholar

Copyright information

© Springer Science+Business Media, Inc. 2005

Authors and Affiliations

  • Krzysztof Szczypiorski
    • 1
  • Aneta Zwierko
    • 1
  • Igor Margasiński
    • 1
  1. 1.Institute of TelecommunicationsWarsaw University of TechnologyWarsawPoland

Personalised recommendations