2008 New Technologies, Mobility and Security 2008
DOI: 10.1109/ntms.2008.ecp.61
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Payment Protocol for Micropayments: Withdrawal and Payment Anonymous

Abstract: This paper presents an efficient and practical protocol to carry out micropayments, based on the use of anonymous mobile cash, that provides anonymity and unlinkability to customers. The mobile cash used in the protocol can be of different value and denomination. It is official after a bank signs it with a specific private key. The bank stores the relation between the mobile cash's value and its corresponding public key. The scheme prevents double spending and forgery attacks. A mobile device that supports jav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 10 publications
(8 reference statements)
0
4
0
Order By: Relevance
“…Due to the fast progress of mobile commerce, several mobile payment systems [1], [2], [3], [4], [5], [6], [7], [8], [9], [10] have been proposed. Some of theses systems are based on mobile cash 1 (m-cash).…”
Section: Introductionmentioning
confidence: 99%
“…Due to the fast progress of mobile commerce, several mobile payment systems [1], [2], [3], [4], [5], [6], [7], [8], [9], [10] have been proposed. Some of theses systems are based on mobile cash 1 (m-cash).…”
Section: Introductionmentioning
confidence: 99%
“…In addition, the virtual credit card can be generated as many times as a user wishes. On the other hands, to provide user anonymity and unlinkability, Martínez-Peláez et al [13] proposed a micropayment protocol basing on the anonymous electronic cash. To increase the performance of online payment protocol, Kungpisdan et al [9] proposed an account-based online payment protocol.…”
Section: Related Workmentioning
confidence: 99%
“…In the area of billing, pseudonyms are used to separate the process of payment (which typically but not always [22] requires the identity of the user) from the actual usage of a particular service [38,8]. Furthermore pseudonyms may be applied to create transactions, which are not linkable in different contexts [34].…”
Section: Introductionmentioning
confidence: 99%