Passive Entities: A Strategy for Electronic Payment Design

The participating entities in an electronic payment usually include an overseeing bank as well as a customer and a merchant. Many electronic payment schemes are designed so that the bank is off-line during the actual payment between the customer and the merchant. This paper introduces the concept of passive entities which allows the protocol designer to allocate the level of processing required by an entity during a particular phase of the payment scheme. To illustrate the use of passive entities, a new electronic payment scheme is developed which has the customer assigned as the passive entity during payment. This new protocol is more efficient than similar protocols. A variation of this protocol is also described in which the identity of the customer is kept anonymous from the merchant.

[1]  Douglas R. Stinson,et al.  Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.

[2]  Stefan A. Brands,et al.  Untraceable Off-line Cash in Wallet with Observers , 2002 .

[3]  Paul F. Syverson,et al.  Fair On-Line Auctions without Special Trusted Parties , 1999, Financial Cryptography.

[4]  Colin Boyd,et al.  A Payment Scheme Using Vouchers , 1998, Financial Cryptography.

[5]  Gerhard Goos,et al.  State of the Art in Applied Cryptography , 1998, Lecture Notes in Computer Science.

[6]  Elisa Bertino,et al.  Computer Security — ESORICS 96 , 1996, Lecture Notes in Computer Science.

[7]  Martín Abadi,et al.  Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..

[8]  Matthew K. Franklin,et al.  The Design and Implementation of a Secure Auction Service , 1996, IEEE Trans. Software Eng..

[9]  Kaisa Nyberg,et al.  Advances in Cryptology — EUROCRYPT'98 , 1998 .

[10]  Alfredo De Santis,et al.  Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.

[11]  Tatsuaki Okamoto,et al.  Single-Term Divisible Electronic Coins , 1994, EUROCRYPT.

[12]  Shafi Goldwasser,et al.  Advances in Cryptology — CRYPTO’ 88: Proceedings , 1990, Lecture Notes in Computer Science.

[13]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[14]  Mihir Bellare,et al.  iKP - A Family of Secure Electronic Payment Protocols , 1995, USENIX Workshop on Electronic Commerce.

[15]  Benjamin Cox,et al.  NetBill Security and Transaction Protocol , 1995, USENIX Workshop on Electronic Commerce.

[16]  Ueli Maurer,et al.  Digital Payment Systems with Passive Anonymity-Revoking Trustees , 1996, ESORICS.

[17]  Yiannis Tsiounis,et al.  Easy Come - Easy Go Divisible Cash , 1998, EUROCRYPT.

[18]  Bruce Schneier,et al.  Conditional purchase orders , 1997, CCS '97.

[19]  Niels Ferguson,et al.  Extensions of Single-term Coins , 1993, CRYPTO.

[20]  Berry Schoenmakers Security aspects of the Ecash payment system , 1998 .

[21]  Stefan Brands,et al.  Electronic cash on the Internet , 1995, Proceedings of the Symposium on Network and Distributed System Security.