Advertisement

E-Ticketing Scheme for Mobile Devices with Exculpability

  • Arnau Vives-Guasch
  • Magdalena Payeras-Capella
  • Macià Mut-Puigserver
  • Jordi Castellà-Roca
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6514)

Abstract

An electronic ticket is a contract, in digital format, between the user and the service provider, and reduces both economic costs and time in many services such as air travel industries or public transport. However, the electronic ticket security has to be strongly guaranteed, as well as the privacy of their users. We present an electronic ticketing system that considers these security requirements and includes the exculpability as a security requirement for these systems, i.e users and the service provider can not falsely accuse each other of misbehaviour. The system ensures that either both parties receive their desired data from other or neither does (fair exchange). Furthermore, this scheme takes special care of the computational requirements on the users’ side, as we consider the use of mobile devices with light-weight cryptography, because they are the best positioned in order to manage the electronic tickets in the near future.

Keywords

e-ticketing e-commerce security privacy exculpability 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bao, F.: A scheme of digital ticket for personal trusted device. In: 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2004), vol. 4, pp. 3065–3069. IEEE, Los Alamitos (2004)Google Scholar
  2. 2.
    Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology - CRYPTO 1982, pp. 199–203 (1983)Google Scholar
  3. 3.
    Chen, Y.-Y., Chen, C.-L., Jan, J.-K.: A mobile ticket system based on personal trusted device. Wireless Personal Communications: An International Journal 40(4), 569–578 (2007)CrossRefGoogle Scholar
  4. 4.
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)Google Scholar
  5. 5.
    Elliot, J.: The one-card trick multi-application smart card e-commerce prototypes. Computing & Control Engineering Journal 10(3), 121–128 (1999); IETCrossRefGoogle Scholar
  6. 6.
    Fujimura, K., Kuno, H., Terada, M., Matsuyama, K., Mizuno, Y., Sekine, J.: Digital-ticket-controlled digital ticket circulation. In: 8th USENIX Security Symposium, pp. 229–240. USENIX (1999)Google Scholar
  7. 7.
    Haneberg, D.: Electronic ticketing: risks in e-commerce applications. In: Digital Excellence, pp. 55–66. Springer, Heidelberg (2008) ISBN 3540726209CrossRefGoogle Scholar
  8. 8.
    Haneberg, D., Stenzel, K., Reif, W.: Electronic-onboard-ticketing: Software challenges of an state-of-the-art m-commerce application. In: Pousttchi, K., Turowski, K. (eds.) Workshop Mobile Commerce. Lecture Notes in Informatics (LNI), vol. 42, pp. 103–113. Gesellschaft für Informatik, GI (2004)Google Scholar
  9. 9.
    Heydt-Benjamin, T.S., Chae, H.-J., Defend, B., Fu, K.: Privacy for public transportation. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 1–19. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  10. 10.
    Gans, G.K., Hoepman, J.-H., Garcia, F.D.: A practical attack on the mifare classic. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 267–282. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  11. 11.
    Kremer, S., Markowitch, O., Zhou, J.: An intensive survey of fair non-repudiation protocols. Computer Communications 25, 1606–1621 (2002)CrossRefGoogle Scholar
  12. 12.
    Kuramitsu, K., Sakamura, K.: Electronic tickets on contactless smartcard database. In: Hameurlain, A., Cicchetti, R., Traunmüller, R. (eds.) DEXA 2002. LNCS, vol. 2453, pp. 392–402. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  13. 13.
    Kuramitsu, K., Murakami, T., Matsuda, H., Sakamura, K.: Ttp: Secure acid transfer protocol for electronic ticket between personal tamper-proof devices. In: 24th Annual International Computer Software and Applications Conference (COMPSAC 2000), Taipei, Taiwan, vol. 24, pp. 87–92 (October 2000)Google Scholar
  14. 14.
    Matsuo, S., Ogata, W.: Electronic ticket scheme for its. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences E86A(1), 142–150 (2003)Google Scholar
  15. 15.
    Patel, B., Crowcroft, J.: Ticket based service access for the mobile user. In: Proceedings of the 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM 1997), Budapest, Hungary, pp. 223–233 (1997)Google Scholar
  16. 16.
    Quercia, D., Hailes, S.: Motet: Mobile transactions using electronic tickets. In: Proceedings 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, Athens, Greece, vol. 24, pp. 374–383 (September 2005)Google Scholar
  17. 17.
    Schnorr, C.-P.: Efficient signature generation by smart cards. J. Cryptology 4(3), 161–174 (1991)MathSciNetCrossRefzbMATHGoogle Scholar
  18. 18.
    Siu, W.I., Guo, Z.S.: Application of electronic ticket to online trading with smart card technology. In: Proceedings of the 6th INFORMS Conference on Information Systems and Technology (CIST 2001), Florida (US), pp. 222–239 (2001)Google Scholar
  19. 19.
    Siu, W.I., Guo, Z.S.: The secure communication protocol for electronic ticket management system. In: 8th Asia-Pacific Software Engineering Conference (APSEC 2001), University of Macau (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Arnau Vives-Guasch
    • 1
  • Magdalena Payeras-Capella
    • 2
  • Macià Mut-Puigserver
    • 2
  • Jordi Castellà-Roca
    • 1
  1. 1.Dpt. d’Enginyeria Informàtica i Matemàtiques, UNESCO Chair in Data PrivacyUniversitat Rovira i VirgiliTarragonaSpain
  2. 2.Dpt. de Ciències Matemàtiques i InformàticaUniversitat de les Illes BalearsPalma de MallorcaSpain

Personalised recommendations