|
|
Verifiable Fairness Micropayment Scheme Based on Commitment |
LIU Yining①② ZHAO Quanyu① |
①(School of Mathematics and Computational Science, Guilin University of Electronic Technology, Guilin 541004, China)
②(Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China) |
|
|
Abstract Due to the large transaction number and tiny value in micropayment, it is not practical to authenticate each transaction. Micali et al. (2002) propose a lottery-based micropayment to integrate multiple micropayment to one macro-payment that is worth using complicated authentication. Liu-Yan scheme (2013) guarantees the result is verifiable by involving all participants’ data. However, there still exists a flaw that the malicious bank maybe obtain the illegal benefit by controlling the specific purchaser not be selected to execute the macro-payment, moreover, this attack can not be detected. In this paper, the flaw is firstly described, then, an improved version is proposed. Specifically the model “multiple purchasers to 1 merchant”in Liu-Yan’s scheme is replaced with a new model “1 purchaser to 1 merchant”, which guarantees the fairness and verifiability for all using the commitment technique.
|
Received: 31 March 2016
Published: 09 October 2016
|
|
Fund: The National Natural Science Foundation of China (61363069, 61301166, 61662016), The Innovation Project of GUET Graduate Education (2016YJCX44), The Innovation Project of Guangxi Graduate Education (YCSZ2015149) |
Corresponding Authors:
LIU Yining
E-mail: ynliu@guet.edu.cn
|
|
|
|
[1] |
YANG Chingnung and WU Chihcheng. MSRC: Micropayment scheme with ability to return changes[J]. Mathematical and Computer Modelling, 2013, 58(1/2): 96-107. doi: 10.1016/j.mcm.2012.07.010.
|
[2] |
王涛, 姚松涛, 郭荷清. 安全微支付技术应用于分布式系统安全审计的研究[J]. 通信学报, 2005, 26(5): 118-121.
|
|
WANG Tao, YAO Songtao, and GUO Heqing. Research on the application of secure micropayment technology in security auditing of distributed system[J]. Journal on Communications, 2005, 26(5): 118-121.
|
[3] |
GHAFOORI Z, DEHGHAN M, and NOURHOSEINI M. PPayWord: A Secure and Fast P2P Micropayment Scheme for Video Streaming[M]. Springer International Publishing Switzerland, Springer International Publishing, 2014: 79-91. doi: 10.1007/978-3-319-10903-9_7.
|
[4] |
HWANG Shinjia. Security Flaws of Off-Line Micro Payment Scheme with Dual Signatures[M]. Springer Science Business Media Dordrecht, Springer Netherlands, 2014: 905-909. doi: 10.1007/978-94-007-7262-5_103.
|
[5] |
CHA Byungrae, LEE Sanghun, PARK Soobong, et al. Design of micropayment to strengthen security by 2 factor authentication with mobile and wearable devices[J]. Advanced Science and Technology Letters, 2015, 109(7): 28-32. doi: org/10.14257/astl.2015.109.07.
|
[6] |
DECKER C and WATTENHOFER R. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels[M]. Springer International Publishing Switzerland, Springer International Publishing, 2015: 3-18. doi: 10.1007/ 978-3-319-21741-3_1.
|
[7] |
CHEUNG Helen and YANG Cungang. A secure electronic payment protocol for wireless mesh networks[J]. International Journal of Network Security and Its Applications, 2014, 6(5): 1-22. doi: 10.5121/ijnsa.2014.6501.
|
[8] |
YEN Sungming, LIN Hsichug, CHEN Yenchang, et al. PayStar: A denomination flexible micropayment scheme[J]. Information Sciences, 2014, 259: 160-169. doi: 10.1016/ j.ins.2013.07.031.
|
[9] |
BIRYUKOV A and PUSTOGAROV I. Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay[M]. Springer Verlag Berlin Heidelberg, Springer Berlin Heidelberg, 2015: 445-455. doi: 10.1007/978-3-662-47854-7_27.
|
[10] |
樊利民, 廖建新. 公平的移动小额支付协议[J]. 电子与信息学报, 2007, 29(11): 2599-2602.
|
|
FAN Limin and LIAO Jianxin. Fair mobile micropayment protocol[J]. Journal of Electronics and Information Technology, 2007, 29(11): 2599-2602.
|
[11] |
万仁福, 李方伟, 朱江. 一种适用于移动环境的认证和支付协议[J]. 电子与信息学报, 2005, 27(3): 498-501.
|
|
WAN Renfu, LI Fangwei, and ZHU Jiang. An efficient authentication and payment protocol for mobile communication[J]. Journal of Electronics & Information Technology, 2005, 27(3): 498-501.
|
[12] |
RIVEST R L and SHAMIR A. Payword and micromint: Two simple micropayment scheme[C]. International Workshop on Security Protocols, Springer-Verlag, 1997, 1189: 69-87. doi: 10.1007/3-540-62494-5_6.
|
[13] |
RIVEST R L. Electronic lottery tickets as micropayments[C]. International Conference on Financial Cryptography, Springer Berlin Heidelberg, 1997: 307-314. doi: 10.1007/ 3-540-63594-7_87.
|
[14] |
SILVIO M and RIVEST R L. Micropayment Revisited[C]. Topics in Cryptology CT-RSA 2002, Springer Berlin Heidelberg, 2002: 149-163. doi: 10.1007/3-540-45760-7_11.
|
[15] |
RAFAEL M, HOMERO T, JOEL R, et al. P2PM-pay: Person to person mobile payment scheme controlled by expiration date[J]. Wireless Personal Communications, 2015, 85(1): 289-304. doi: 10.1007/s11277-015-2738-y.
|
[16] |
LIU Yining, HU Lei, and LIU Heguo. A micropayment scheme based on weighted multi-dimensional hash chain[J]. Journal of Electronics (China), 2006, 23(5): 791-794. doi: 10.1007/s11767-005-0219-2.
|
[17] |
LIU Yining and YAN Jihong. A lightweight micropayment scheme based on Lagrange interpolation formula[J]. Security and Communication Networks, 2013, 6(8): 955-960. doi: 10.1002/sec.643.
|
[18] |
SAZE G. Generation of key pre-distribution schemes using secret sharing scheme[J]. Discrete Applied Mathematics, 2003, 128(1): 239-249. doi: 10.1016/S1571-0653(04)00173-8.
|
|
|
|