The State of the Art in Electronic Payment Systems

The exchange of goods conducted face-to-face between two parties dates back to before the beginning of recorded history. Traditional means of payment have always had security problems, but now electronic payments retain the same drawbacks and add some risks. Unlike paper, digital "documents" can be copied perfectly and arbitrarily often, digital signatures can be produced by anybody who knows the secret cryptographic key, and a buyer's name can be associated with every payment, eliminating the anonymity of cash. Without new security measures, widespread electronic commerce is not viable. On the other hand, properly designed electronic payment systems can actually provide better security than traditional means of payments, in addition to flexibility. This article provides an overview of electronic payment systems, focusing on issues related to security.

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[3]  Andreas Pfitzmann,et al.  Digital payment systems enabling security and unobservability , 1989, Comput. Secur..

[4]  Hermann Kopetz,et al.  Fault tolerance, principles and practice , 1990 .

[5]  David Naccache,et al.  On blind signatures and perfect crimes , 1992, Comput. Secur..

[6]  Stefan A. Brands,et al.  Untraceable Off-line Cash in Wallet with Observers , 2002 .

[7]  B. Clifford Neuman,et al.  NetCash: a design for practical electronic currency on the Internet , 1993, CCS '93.

[8]  Ross J. Anderson Why cryptosystems fail , 1993, CCS '93.

[9]  Sanjoy Paul,et al.  Anonymous credit cards , 1994, CCS '94.

[10]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[11]  Ronald Cramer,et al.  The ESPRIT Project CAFE - High Security Digital Payment Systems , 1994, ESORICS.

[12]  Andrew C. Payne,et al.  Payment switches for open networks , 1995, Digest of Papers. COMPCON'95. Technologies for the Information Superhighway.

[13]  Benjamin Cox,et al.  NetBill Security and Transaction Protocol , 1995, USENIX Workshop on Electronic Commerce.

[14]  Markus Jakobsson,et al.  Revokable and versatile electronic money (extended abstract) , 1996, CCS '96.

[15]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[16]  Charalampos Manifavas,et al.  NetCard - A Practical Electronic-Cash System , 1996, Security Protocols Workshop.

[17]  Andreas Paepcke,et al.  U-PAI: A Universal Payment Application Interface , 1996 .

[18]  Ralf Hauser,et al.  Micro-Payments based on iKP , 1996 .

[19]  Adi Shamir,et al.  PayWord and MicroMint: Two Simple Micropayment Schemes , 1996, Security Protocols Workshop.

[20]  Alireza Bahreman Generic electronic payment services: framework and functional specification , 1996 .

[21]  Martín Abadi,et al.  The Millicent Protocol for Inexpensive Electronic Commerce , 1995, World Wide Web J..

[22]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[23]  Ueli Maurer,et al.  Digital Payment Systems with Passive Anonymity-Revoking Trustees , 1996, ESORICS.

[24]  M. Yung,et al.  \indirect Discourse Proofs": Achieving Eecient Fair Oo-line E-cash , 1996 .

[25]  Nathaniel S. Borenstein Perils and pitfalls of practical cybercommerce , 1996, CACM.

[26]  Torben P. Pedersen Electronic Payments of Small Amounts , 1995, Security Protocols Workshop.

[27]  B. Pfitzmann,et al.  Properties of Payment Systems - General Definition Sketch and Classification , 1996 .

[28]  Birgit Pfitzmann,et al.  Trusting Mobile User Devices and Security Modules , 1997, Computer.

[29]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[30]  Amir Herzberg,et al.  MiniPay: Charging per Plick on the Web , 1997, Comput. Networks.

[31]  Birgit Pfitzmann,et al.  Strong loss tolerance of electronic coin systems , 1997, TOCS.

[32]  Guillaume Poupard,et al.  Efficient scalable fair cash with off-line extortion prevention , 1997, ICICS.

[33]  Richard J. Lipton,et al.  On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.

[34]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[35]  N. Asokan,et al.  Towards a Framework for Handling Disputes in Payment Systems , 1998, USENIX Workshop on Electronic Commerce.

[36]  N. Asokan,et al.  Designing a Generic Payment Service , 1998, IBM Syst. J..

[37]  P. Wallich How to steal millions in chump change. , 1999, Scientific American.

[38]  Pankaj Rohatgi,et al.  Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.

[39]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[40]  Suresh Chari,et al.  A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards , 1999 .