Payment Protocol

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 4671 Experts worldwide ranked by ideXlab platform

Shu Cui Xie - One of the best experts on this subject based on the ideXlab platform.

  • A Multi-bank E-Payment Protocol Based on Quantum Proxy Blind Signature
    International Journal of Theoretical Physics, 2019
    Co-Authors: Kalibinuer Tiliwalidi, Jian Zhong Zhang, Shu Cui Xie
    Abstract:

    A new multi-bank E-Payment Protocol based on quantum multi-proxy blind signature is presented in this paper. In contrast to classical E-Payment Protocol, our quantum E-Payment Protocol can not only protect the user’s anonymity but also provide them different options to pay. For instance, when user wants to pay, he can choose Wechat wallet, Alipay or various bank accounts as well. Von-Neumann measurement and unitary operation are adapted in this scheme. Moreover, we use quantum multi-proxy blind signature, quantum key distribution (QKD) Protocol and one-time pad in our study. Accordingly, our multi-bank E-Payment system could protect user’s anonymity and also have unconditional security.

  • A Trusted Third-Party E-Payment Protocol Based on Quantum Blind Signature Without Entanglement
    International Journal of Theoretical Physics, 2018
    Co-Authors: Xi Guo, Jian Zhong Zhang, Shu Cui Xie
    Abstract:

    In this paper, we present a trusted third-party e-Payment Protocol which is designed based on quantum blind signature without entanglement. The security and verifiability of our scheme are guaranteed by using single-particle unitary operation, quantum key distribution (QKD) Protocol and one-time pad. Furthermore, once there is a dispute among the participants, it can be solved with the assistance of the third-party platform which is reliant.

  • A Third-Party E-Payment Protocol Based on Quantum Multi-proxy Blind Signature
    International Journal of Theoretical Physics, 2018
    Co-Authors: Xu-feng Niu, Shu Cui Xie, Jian Zhong Zhang, Bu-qing Chen
    Abstract:

    A third-party E-Payment Protocol is presented in this paper. It is based on quantum multi-proxy blind signature. Adopting the techniques of quantum key distribution, one-time pad and quantum multi-proxy blind signature, our third-party E-Payment system could protect user’s anonymity as the traditional E-Payment systems do, and also have unconditional security which the classical E-Payment systems can not provide. Furthermore, compared with the existing quantum E-Payment systems, the proposed system could support the E-Payment which using the third-party platforms.

  • A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature
    International Journal of Theoretical Physics, 2017
    Co-Authors: Jian Zhong Zhang, Yuan-yuan Yang, Shu Cui Xie
    Abstract:

    A third-party E-Payment Protocol based on quantum group blind signature is proposed in this paper. Our E-Payment Protocol could protect user’s anonymity as the traditional E-Payment systems do, and also have unconditional security which the classical E-Payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  • An E-Payment Protocol Based on Quantum Multi-proxy Blind Signature
    International Journal of Theoretical Physics, 2017
    Co-Authors: Ai-xia Shao, Jian Zhong Zhang, Shu Cui Xie
    Abstract:

    Based on quantum multi-proxy blind signature, a new E-Payment Protocol is proposed in this paper. Adopting the techniques of quantum key distribution, one-time pad and quantum proxy blind signature, our E-Payment Protocol could protect user’s anonymity as the traditional E-Payment systems do, and also have unconditional security which the classical E-Payment systems cannot provide. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the Protocol reliable and practical.

Sangseung Kang - One of the best experts on this subject based on the ideXlab platform.

  • ticket based authentication and Payment Protocol for mobile telecommunications systems
    Pacific Rim International Symposium on Dependable Computing, 2001
    Co-Authors: Byungrae Lee, Taiyun Kim, Sangseung Kang
    Abstract:

    In third generation mobile telecommunication systems such as UMTS, one of the important problems for value-added services is to check the recoverability of costs used by a mobile user. We present an efficient public-key Protocol for mutual authentication and key exchange designed for value-added services in UMTS. The proposed ticket based authentication and Payment Protocol provides an efficient way for VASP to check the recoverability of costs without communication with the online TTP. Furthermore, the ticket based Protocol can provide anonymous service usage for a mobile user.

  • PRDC - Ticket based authentication and Payment Protocol for mobile telecommunications systems
    Proceedings 2001 Pacific Rim International Symposium on Dependable Computing, 1
    Co-Authors: Byungrae Lee, Taiyun Kim, Sangseung Kang
    Abstract:

    In third generation mobile telecommunication systems such as UMTS, one of the important problems for value-added services is to check the recoverability of costs used by a mobile user. We present an efficient public-key Protocol for mutual authentication and key exchange designed for value-added services in UMTS. The proposed ticket based authentication and Payment Protocol provides an efficient way for VASP to check the recoverability of costs without communication with the online TTP. Furthermore, the ticket based Protocol can provide anonymous service usage for a mobile user.

Chun-yan Wei - One of the best experts on this subject based on the ideXlab platform.

Supakorn Kungpisdan - One of the best experts on this subject based on the ideXlab platform.

  • Design and analysis of a secure agent-based mobile bill Payment Protocol for bulk transactions
    2012 Ninth International Conference on Computer Science and Software Engineering (JCSSE), 2012
    Co-Authors: Pemika Limpittaya, Maykin Warasart, Supakorn Kungpisdan
    Abstract:

    Nowadays, an agent-based mobile pa yment has become more popular. However, existing Payment systems still lack of necessary mobile Payment properties. Especially, they should be shorter and lightweight for making Payment on the move. This paper introduces a new secure lightweight mobile bill Payment Protocol with assistance of an intermediary acting as an agent to collect and process Payment requests made by clients. This Protocol not only satisfies necessary transaction security properties, but it is also simple and compatible to existing mobile Payment infrastructure.

  • SMS-based Mobile Payment Protocol
    2011
    Co-Authors: Surakarn Duangphasuk, Maykin Warasare, Supakorn Kungpisdan
    Abstract:

    Nowadays, most of mobile Payment transactions are made through Short Message Service (or SM S). A number of SM S­ based mobile Payment Protocols have been proposed but still lack of security properties. This paper introduces a new SM S-based operator-assiste d mobile Payment Protocol called SOMP. The proposed Protocol offers clients the ability to perform Payment transactions directly to the mobile operator itself or to merchants through the mobile operator. We perform accountability analysis to show that SOMP satisfies necessary security properties. Moreover, SOMP is easy to use and compatible with existing SM S infrastructure.

  • Design and accountability analysis of a secure SMS-based mobile Payment Protocol
    The 8th Electrical Engineering Electronics Computer Telecommunications and Information Technology (ECTI) Association of Thailand - Conference 2011, 2011
    Co-Authors: Surakarn Duangphasuk, Maykin Warasart, Supakorn Kungpisdan
    Abstract:

    Nowadays, most of mobile Payment transactions are made through Short Message Service (or SMS). A number of SMS-based mobile Payment Protocols have been proposed but still lack of necessary security properties. This paper introduces a new SMS-based operator-assisted mobile Payment Protocol called SOMP. The proposed Protocol offers clients the ability to perform Payment transactions directly to the mobile operator itself or to merchants through the mobile operator. We perform accountability analysis to show that SOMP satisfies necessary security properties. Moreover, SOMP is easy to use and compatible with existing SMS infrastructure.

  • a secure account based mobile Payment Protocol
    International Conference on Information Technology: Coding and Computing, 2004
    Co-Authors: Supakorn Kungpisdan, Bala Srinivasan
    Abstract:

    In this paper, we propose a secure account-based Payment Protocol which is suitable for wireless networks. The proposed Protocol employs symmetric-key operations which require lower computation at all engaging parties than existing Payment Protocols. The proposed Protocol also satisfies transaction security properties provided by public-key based Payment Protocols such as SET and iKP. The formal analysis illustrates that our Protocol achieves the goals of Payment Protocols. Moreover, the credit-card information is not required to be sent during transactions which results in a security enhancement of the system.

  • lightweight mobile credit card Payment Protocol
    International Conference on Cryptology in India, 2003
    Co-Authors: Supakorn Kungpisdan, Bala Srinivasan
    Abstract:

    Recently, making Internet credit-card Payment is widely accepted. Several Payment Protocols have been proposed to secure the credit-card Payment on fixed networks. However, these Protocols do not apply well to wireless networks due to the limitations of wireless devices and wireless networks themselves. In this paper, we propose a simple and powerful credit-card Payment Protocol for wireless networks. We implement a secure cryptographic technique that works well under this Protocol. We show that our proposed Protocol is more suitable for applying to wireless networks than SET and iKP in that client’s computation is reduced. The Protocol also satisfies all security properties provided by both SET and iKP. Moreover, it offers the ability to resolve disputes and recover from failures which are normally occurred in wireless environment. Furthermore, client’s credit-card information is not required to be sent in the Protocol. It results in the security enhancement of the system.

Tan Chew Lim - One of the best experts on this subject based on the ideXlab platform.

  • virtual card Payment Protocol and risk analysis using performance scoring
    International Parallel and Distributed Processing Symposium, 2001
    Co-Authors: Xu Xianhua, Sung Sam Yuan, Ge Ling, Tan Chew Lim
    Abstract:

    There are several Payment Protocols mediated by trusted third party functioning as bank (or credit card) agents. But these Protocols do not integrate all parts of the Protocol together. These agents only establish Payment intention but not handle settlement. These Protocols rely on traditional Payment systems and logistics pathways to complete transactions thus the efficiency is low. In addition, though the agents in these Protocols took up some services of the traditional financial conglomerates, risk analysis of the agents is unintentionally neglected. Here we developed an integrative and instantaneous Payment Protocol-virtual card Payment Protocol. Broker in our Protocol is a bank agent, a financial conglomerate, a logistics assistant, a creditor to score participants' performance and an arbitrator to solve dispute between customers and merchants. In this Protocol, one transaction is divided into 3 parts and different parts of the transaction apply different security level. Settlement can be instantaneously handled totally online, without direct involvement of traditional Payment systems. Logistics is integrated to process through Internet. We define this technique "pay-on-delivery-online". Since inconsistency in transactions causes customer to complain, we introduce complaint-processing to build trust among involved participants. To dissipate risk concentration in Broker, we propose an algorithm to quantify participants' trustworthiness by estimating participants' transaction history with statistic analysis. Since it assumes that the participants' performance can only be evaluated by those that have established business with them, the model is more objective than poll online and is like the credit scoring or behavioral scoring in real world banking systems.

  • IPDPS - Virtual card Payment Protocol and risk analysis using performance scoring
    Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001, 1
    Co-Authors: Xu Xianhua, Sung Sam Yuan, Ge Ling, Tan Chew Lim
    Abstract:

    There are several Payment Protocols mediated by trusted third party functioning as bank (or credit card) agents. But these Protocols do not integrate all parts of the Protocol together. These agents only establish Payment intention but not handle settlement. These Protocols rely on traditional Payment systems and logistics pathways to complete transactions thus the efficiency is low. In addition, though the agents in these Protocols took up some services of the traditional financial conglomerates, risk analysis of the agents is unintentionally neglected. Here we developed an integrative and instantaneous Payment Protocol-virtual card Payment Protocol. Broker in our Protocol is a bank agent, a financial conglomerate, a logistics assistant, a creditor to score participants' performance and an arbitrator to solve dispute between customers and merchants. In this Protocol, one transaction is divided into 3 parts and different parts of the transaction apply different security level. Settlement can be instantaneously handled totally online, without direct involvement of traditional Payment systems. Logistics is integrated to process through Internet. We define this technique "pay-on-delivery-online". Since inconsistency in transactions causes customer to complain, we introduce complaint-processing to build trust among involved participants. To dissipate risk concentration in Broker, we propose an algorithm to quantify participants' trustworthiness by estimating participants' transaction history with statistic analysis. Since it assumes that the participants' performance can only be evaluated by those that have established business with them, the model is more objective than poll online and is like the credit scoring or behavioral scoring in real world banking systems.