Skip to main content

Electronic Payments: Where Do We Go from Here?

  • Conference paper
  • First Online:
Secure Networking — CQRE [Secure] ’ 99 (CQRE 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1740))

Included in the following conference series:

Abstract

Currently, the Internet and the World Wide Web on-line business is booming, with traffic, advertising and content growing at sustained exponential rates. However, the full potential of on-line commerce has not been possible to realize due to the lack of convenient and secure electronic payment methods (e.g., for buying e-goods and paying with e-money). Although it became clear very early that it is vital for payments to be safe and efficient, and to avoid requiring complicated user intervention, it is still the case that the Internet payment method of choice today is that of traditional credit cards. Despite their widespread use and market penetration, these have a number of significant limitations and shortcomings, including lack of security, lack of anonymity, inability to reach all audiences due to credit requirements, large overhead with respect to payments, and the related inefficiency in processing small payment amounts.

These limitations (some of which are present in the real world) prompted the design of alternative electronic payment systems very early in the Internet age–even before the conception of the World Wide Web. Such designs promised the security, anonymity, efficiency, and universal appeal of cash transactions, but in an electronic form. Some early schemes, such as the one proposed by First Virtual, were built around the credit card structure; others, such as the scheme developed by DigiCash, offered a solution with cryptographic security and payer anonymity. Still others, such as Millicent, introduced micropayment solutions. However, none of these systems managed to proliferate in the marketplace, and most have either ceased to exist or have only reached a limited audience.

This paper is associated with a panel discussion whose purpose is to address the reasons why the international e-commerce market has rejected proposed solutions, and to suggest new ways for electronic payments to be used over the Internet, avoiding the problems inherent in credit card transactions. The purpose of this paper is to set the stage for such a discussion by presenting, in brief, some of the payment schemes currently available and to discuss some of the basic problems in the area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Anderson, C. Manifavas, and C. Sutherland. Netcard-a practical electronic cash system. In Fourth Cambridge Workshop on Security Protocols. Springer-Verlag, 1996. Available at http://www.cl.cam.ac.uk/users/rja14.

  2. Report by the Committee on Payment, Settlement Systems, and the Group of Computer Experts of Central Banks of the Group of Ten countries, Security of Electronic Money, http://www.bis.org/publ/index.html, 1996

  3. Report of the working party on electronic money of the Group of Ten countries, Electronic Money-Consumer Protection, Law enforcement, Supervisory and Cross Border Issues, http://www.bis.org/publ/index.html, 1997

  4. Basle Committee on Banking Supervision, Core Principles for Effective Banking Supervision, http://www.bis.org/publ/index.html, 1997

  5. Basle Committee on Banking Supervision, Risk Management for Electronic Banking and Electronic Money Activities, http://www.bis.org/publ/index.html, 1998

  6. S. Brands, Untraceable Off-Line Cash in Wallets with Observers, Crypto’93

    Google Scholar 

  7. J. Boly, A. Bosselaers, R. Cramer, R. Michelsen, S. Mjolsns, F. Muller, T. Pedersen, B. Pfitzmann, P. de Rooij, B. Schoonmakers, M. Schunter, L. Vallee and M. Waidner, The ESPRIT Project CAFE: High Security Digital Payment Systems, ESORICS’94

    Google Scholar 

  8. M. Bellare, J. Garay, C. Jutla, and M. Yung, VarietyCash: A Multi-Purpose Electronic Payment System (Extended Abstract), Usenix Workshop on Electronic Commerce’98

    Google Scholar 

  9. E. F. Brickell, P. Gemmell, and D. Kravitz, Trustee-Based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change, SODA’95

    Google Scholar 

  10. H. Burk and A. Pfitzmann, Digital Payment Systems Enabling Security and Unobservability, Computer & Security, 8/5, 1989, 399-416

    Google Scholar 

  11. D. Chaum, Blind Signatures for Untraceable Payments, Crypto’82

    Google Scholar 

  12. D. Chaum, A. Fiat, and M. Naor, Untraceable Electronic Cash, Crypto’88

    Google Scholar 

  13. A. Chan, Y. Frankel, and Y. Tsiounis, Easy Come-Easy Go Divisible Cash, Eurocrypt’98

    Google Scholar 

  14. J. Camp, M. Harkavy, J. D. Tygar, and B. Yee, Anonymous Atomic Transactions, 2nd Usenix on Electronic Commerce, 1996

    Google Scholar 

  15. J. Camenisch, U. Maurer, and M. Stadler. Digital Payment Systems with Passive Anonymity-Revoking Trustees. In ESORICS’ 96, LNCS 1146. Springer-Verlag, 1996.

    Google Scholar 

  16. J. Camenisch, J.-M. Piveteau, and M. Stadler. Fair Blind Signatures. In Eurocrypt’ 95, LNCS 921, pages 209–219. Springer-Verlag, 1995.

    Google Scholar 

  17. J. Camenisch, J.-M. Piveteau, and M. Stadler. An Efficient Fair Payment System. In Proc. of the 3rd CCCS, pages 88–94. ACM press, 1996.

    Google Scholar 

  18. B. Cox, D. Tygar, and M. Sirbu. Netbill security and transactions protocol. In First USENIX Workshop on Electronic Commerce, 1995. Available at http://www.ini.cmu/NETBILL/home.html.

  19. S. Crocker, The Siren Song of Internet Micropayments. In iMP Magazine, April 99. http://www.cisp.org/imp/april_99/04_99crocker.htm.

  20. G. Davida, Y. Frankel, Y. Tsiounis, and M. Yung, Anonymity Control in e-cash. In the 1-st Financial Cryptography, LNCS 1318 Springer.

    Google Scholar 

  21. A. de Solages and J. Traore, An Efficient Fair off-line electronic cash with extensions to checks and wallets with observers, In the 2-d Financial Cryptography. eCharge. eCharge, http://echarge.com

  22. N. Ferguson, Extensions of Single-Term Coins, Crypto’93

    Google Scholar 

  23. Y. Frankel, D. Kravitz C. T. Montgomery and M. Yung, Beyond Identity: Warranty-based Digital Signature Transactions, Financial Cryptography 98.

    Google Scholar 

  24. Y. Frankel, Y. Tsiounis, and M. Yung, Indirect Discourse Proofs: Achieving Fair Off-Line E-Cash, Asiacrypt’96.

    Google Scholar 

  25. Y. Frankel, Y. Tsiounis, and M. Yung. Fair Off-Line e-Cash Made Easy, Asiacrypt’98.

    Google Scholar 

  26. M.K. Franklin and M. Yung, Secure and Efficient Off-line Digital Money, ICALP’93 LNCS 700, Springer Verlag. 1993.

    Google Scholar 

  27. M. Froomkin, Anonymity and Its Enmities, 1 JOL (Journal of On-Line Law), art. 4.

    Google Scholar 

  28. General Accounting Office (GAO), Private Banking: Raul Salinas, Citibank, and Alleged Money Laundering, http://www.gao.gov, 1998.

  29. S. Glassman, M. Manasse, M. Abadai, P. Gauthier, and P. Sobalvarro. The Milicent Protocol for Inexpensive Electronic Commerce. In Fourth International World Wide Web Conference, 1995. Available at http://www.research.digital.com/SRC/milicent.

  30. E. Gabber and A. Silberschatz. Agora: A Minimal Distributed Protocol for Electronic Commerce. In USENIX Workshop on Electronic Commerce, 1996.

    Google Scholar 

  31. R. Hauser, M. Steiner, and M. Waidner. Micro-Payments based on IKP. In Worldwide Congress on Computer and Communications Security Protocol, 1996. Available at http://www.zurich.ibm.com/ Technology/Security/publications/1996/HSW96-new.ps.gz.

  32. http://www.ibill.com.

  33. QC technology http://www.qctechnology.nl.

  34. M. Jakobsson, Ripping Coins for a Fair Exchange, Eurocrypt’95

    Google Scholar 

  35. M. Jakobsson and D. M’Raihi, Mix-based Electronic Payments, Workshop on Selected Areas in Cryptography, 1998

    Google Scholar 

  36. M. Jakobsson and M. Yung. Revokable and Versatile Electronic Money. In Proc. of the 3rd CCCS, pages 76–87. ACM press, 1996.

    Google Scholar 

  37. M. Jakobsson and M. Yung. On Assurance Structures for WWW Commerce. Financial Cryptography 98.

    Google Scholar 

  38. M. Jakobsson, A. Juels, “Proofs of Work and Breadpudding Protocols”, CMS’ 99.

    Google Scholar 

  39. JO97. S. Jarecki and A. Odlyzko. An Efficient Micropayment Scheme based on Probabilistic Polling. In Financial Cryptography’ 97, LNCS 1318. Springer-Verlag, 1997.

    Google Scholar 

  40. C. S. Jutla and M. Yung. PayTree: “Amortized-Signature” for Flexible MicroPayments. In Second USENIX Workshop on Electronic Commerce, 1996.

    Google Scholar 

  41. G. Medvinsky and C. Neuman. Netcash: A Design for Ppractical Electronic Currency on the Internet. In Second ACM Conference on Computer and Communication Security, 1994.

    Google Scholar 

  42. R. C. Molander, D. A. Mussington, and P. Wilson, Cyberpayments and Money Laundering, http://www.rand.org/publications/MR/MR965/MR965.pdf, 1998.

  43. Mondex. http://www.mondex.com.

  44. D. M’Raihi. Cost-Effective Payment Schemes with Privacy Regulation. In Asiacrypt’ 96, LNCS 1163, pages 266–275. Springer-Verlag, 1996.

    Google Scholar 

  45. C. Neuman and G. Medvinsky. Requirements for Network Payment: The Netcheque Prospective. In IEEE COMCON, 1995. Available at ftp://prospero.isi/edu/pub/papers/security/.

  46. Organization for Economic Co-operation and Development, OECD Workshops on the Economics of the Information Society, 1997.

    Google Scholar 

  47. T. Okamoto, An Efficient Divisible Electronic Cash Scheme, Crypto’95

    Google Scholar 

  48. T. Okamoto and K. Ohta, Disposable Zero-Knowledge Authentication and Their Applications to Untraceable Electronic Cash, Crypto’89

    Google Scholar 

  49. T. Okamoto and K. Ohta, Universal Electronic Cash, Crypto’91

    Google Scholar 

  50. T. Pedersen. Electronic Payments of Small Amounts. Technical report, Aarhus University, Computer Science Department, 1995. DAIMI PB-495.

    Google Scholar 

  51. B. Pfitzmann and M. Waidner, Strong Loss Tolerance of Electronic Coin Systems, ACM Tran. Computer Systems 15/2 1997, 194–213.

    Article  Google Scholar 

  52. R. Rivest. Electronic Lottery Tickets as Micro-Cash. In Financial Cryptography’ 97, LNCS 1318. Springer-Verlag, 1997.

    Google Scholar 

  53. R. Rivest. Lottery Tickets as Micro-Cash, 1997. Financial Cryptography’ 97 Rump Session.

    Google Scholar 

  54. R. Rivest, A. Shamir, “PayWord and MicroMint: Two simple micropayment schemes”, May 1996. (also in CryptoBytes)

    Google Scholar 

  55. T. Sander and A. Ta-Shma, Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems, Financial Cryptography’99.

    Google Scholar 

  56. ST99b. T. Sander and A. Ta-Shma, Auditable, Anonymous Electronic Cash (Extended Abstract), Crypto’99.

    Google Scholar 

  57. B. Schoenmakers, Basic Security of the ecash Payment System, Computer Security and Industrial Cryptography: State of the Art and Evolution, LNCS series, 1997.

    Google Scholar 

  58. D. Simon, Anonymous Communication and Anonymous Cash, Crypto’96.

    Google Scholar 

  59. M. Stadler. Publicly verifiable secret sharing. In Eurocrypt’ 96, LNCS 1070, pages 190–199. Springer-Verlag, 1996.

    Google Scholar 

  60. M. Stadler, J. M. Piveteau, and J. Canmenisch, Fair Blind Signature, Eurocrypt’95

    Google Scholar 

  61. J. Stern and S. Vaudenay. Small-value payment: a flexible micropayment scheme. In Financial Cryptography’ 97, LNCS 1318. Springer-Verlag, 1997.

    Google Scholar 

  62. J. D. Tygar, Atomicity in Electronic Commerce, ACM Symposium on Principles of Distributed Computing, 1996

    Google Scholar 

  63. TelPay. http://www.telpay.ca.

  64. S. von Solms and D. Naccache. On Blind Signatures and Perfect Crimes. Computers & Security, 11:581–583, 1992.

    Google Scholar 

  65. M. Waidner, Open Issues in Secure Electronic Commerce, 1998

    Google Scholar 

  66. S. Xu, M. Yung, G. Zhang and H. Zhu, Money Conservation via Atomicity in Fair Off-Line E-Cash. In ISW’99. Kuala Lumpur, Malaysia, Springer-Verlag, 1999.

    Google Scholar 

  67. Y. Yacobi. On the continuum between on-line and off-line e-cash systems. In Financial Cryptography’ 97. Springer-Verlag, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jakobsson, M., M’Raihi, D., Tsiounis, Y., Yung, M. (1999). Electronic Payments: Where Do We Go from Here?. In: Secure Networking — CQRE [Secure] ’ 99. CQRE 1999. Lecture Notes in Computer Science, vol 1740. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46701-7_4

Download citation

  • DOI: https://doi.org/10.1007/3-540-46701-7_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66800-8

  • Online ISBN: 978-3-540-46701-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics