Skip to main content

Undeniable Mobile Billing Schemes

  • Conference paper
Public Key Infrastructure (EuroPKI 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4582))

Included in the following conference series:

Abstract

An undeniable mobile billing system allows a mobile network service provider to bill its subscribers with trustworthy evidences. Chen, Jan and Chen proposed such a billing system by introducing a trusted third party – Observer and exploiting a hash chain mechanism. In their system, the Observer provides call time evidence to both cellular carriers and subscribers for billing. In this paper, we first identify some vulnerabilities in their mobile billing system. Then, we propose an undeniable billing scheme based on a proper combination of digital signature and hash chain mechanism. The proposed scheme can achieve authentication, non-repudiation, and fairness, which are desirable security requirements for an undeniable mobile billing system.

Project supported by the National Nature Science Foundation of China key project(No.90104005) and Specialized Research Fund for the Doctoral Program of Higher Education(No. 20050248043). The primary author’s work was done during his attachment to the Institute for Infocomm Research under its sponsorship.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Rogaway, P.: Minimizing the use of random oracles in authenticated encryption schemes. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 1–16. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  2. Chen, L., Hitz, H.J., Horn, G., Howker, K., Kessler, V., Knudsen, L., Mitchell, C.J.: The use of trusted third parties and secure billing in umts. In: Proceedings of ACTS Mobile Telecommunications Summit, pp. 493–499, Granada (1996)

    Google Scholar 

  3. Chen, Y.-Y., Jan, J.-K., Chen, C.-L.: A fair and secure mobile billing system. Computer Networks 48(4), 517–524 (2005)

    Article  Google Scholar 

  4. Martin, K.M., Preneel, B., Mitchell, C.J., Hitz, H.-J., Horn, G., Poliakova, A., Howard, P.: Secure billing for mobile information services in umts. In: Campolargo, M., Mullery, A. (eds.) IS&N 1998. LNCS, vol. 1430, pp. 535–548. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  5. Shenker, S., Clark, D., Estrin, D., Herzog, S.: Pricing in computer networks: reshaping the research agenda. SIGCOMM Comput. Commun. Rev. 26(2), 19–43 (1996)

    Article  Google Scholar 

  6. Zhou, J., Lam, K.-Y.: Undeniable billing in mobile communication. In: MobiCom ’98: Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, New York, USA, 1998, pp. 284–290. ACM Press, New York (1998)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Javier Lopez Pierangela Samarati Josep L. Ferrer

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, S., Wang, G., Zhou, J., Chen, K. (2007). Undeniable Mobile Billing Schemes. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds) Public Key Infrastructure. EuroPKI 2007. Lecture Notes in Computer Science, vol 4582. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73408-6_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73408-6_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73407-9

  • Online ISBN: 978-3-540-73408-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics