Abstract
In this work, we present a mobile e-payment scenario where the merchant entity has important connectivity restrictions, which is only able of communicating through short distance connections (Wi-Fi or Bluetooth). To protect the exchange of messages, our work describes a payment protocol centered in the client which applies digital signature with recovery using self-certified public keys. Additionally, security aspects have been analyzed and protocol implementation specifications have been presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Isaac, J.T., Camara, J.S., Manzanares, A.I., Márquez, J.T.: Anonymous payment in a Kiosk centric model using digital signature scheme with message recovery and low computational power devices. J. Theor. Appl. Electron. Commer. Res. 1(2), 1–11 (2006)
Zhang, J., Li, H.: On the security of a digital signature with message recovery using self-certified public key. In: Proceedings: 2005 International Conference on Wireless Communications, Networking and Mobile Computing, vol. 2(23-26), pp. 1171–1174 (2005)
Isaac, J.T., Camara, J.S.: An Anonymous Account-Based Mobile Payment Protocol for a Restricted Connectivity Scenario. In: Proceedings of the 18th international Conference on Database and Expert Systems Applications. DEXA, September 3-7, pp. 688–692. IEEE Computer Society, Washington (2007)
Chang, Y., Chang, C., Huang, H.: Digital signature with recovery using slef-certified public keys without trustworthy system authority. Journal of Applied Mathematics and Computation 161(1), 211–227 (2005)
Tseng, Y., Jan, J., Chien, H.: Digital signature with message recovery using self-certified public keys and its variants. Journal of Applied Mathematics and Computation 136(2-3) (2003)
Zhang, J., Zou, W., Chen, D., Wang, Y.: On the Security of a Digital Signature with Message Recovery using self-certified public key. Soft Computing in Multimedia Processing Special Issue of the Informatica Journal 29(3), 343–346 (2005)
Kungpisdan, S., Srinivasan, B., Dung Le, P.: Information Technology: Coding and Computing, 2004. In: International Conference on Proceedings ITCC 2004, vol. 1(5-7), pp. 35–39 (2004)
Abad Peiro, J.L., Asokan, N., Steiner, M., Waidner, M.: Designing a generic payment service. IBM Syst. J. 37(1998), 72–88 (1998)
Girault, M.: Self-Certified Public Keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490–497. Springer, Heidelberg (1991)
The Legion of the Bouncy Castle, The Legion of the Bouncy Castle Java cryptography API version 1.42 (2008), http://www.bouncycastle.org/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Viedma Astudillo, M., Téllez Isaac, J., Suarez Touceda, D., Plaza López, H. (2009). Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public Key. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2009. ICCSA 2009. Lecture Notes in Computer Science, vol 5593. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02457-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-02457-3_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02456-6
Online ISBN: 978-3-642-02457-3
eBook Packages: Computer ScienceComputer Science (R0)