{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:23:10Z","timestamp":1772119390885,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100008975","name":"Universitat de Les Illes Balears","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100008975","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    The development of e-commerce applications for small-value transactions introduces significant security and privacy challenges. Micropurchases, that is, commercial operations involving micropayments, offer a practical solution that balances efficiency and security for these transactions. The increasing demand for this payment approach, especially with technologies such as the Internet of Things (IoT), highlights the need for innovative solutions. This paper presents a novel micropurchase protocol utilizing a new type of channels, termed transferable payment channels. The proposed protocol, managed through smart contracts, facilitates fair and equitable exchanges between minimal monetary units (\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$\\mu $$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mi>\u03bc<\/mml:mi>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    -coins) and desired goods or services, enabling efficient low-value payments. Transferable payment channels enable off-chain transactions, reducing the reliance on on-chain transactions to achieve essential security features and ensure fair exchanges without a centralized intermediary or Trusted Third Party (TTP), commonly employed in traditional payment systems. The protocol outlines the processes for making purchases, handling payments, and incorporating functionalities for the transfer and reuse of payment channels by both customers and merchants. Additionally, it specifies procedures for merchants to redeem earned\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$\\mu $$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mi>\u03bc<\/mml:mi>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    -coins and for customers to refund unused\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$\\mu $$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mi>\u03bc<\/mml:mi>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    -coins. This comprehensive set of functions makes the protocol fully functional and highly efficient for micropurchases. By introducing transferable payment channels and minimizing reliance on centralized intermediaries, this work significantly advances the security and efficiency of micropayment systems. The proposed protocol has been implemented and analyzed for both security and performance.\n                  <\/jats:p>","DOI":"10.1007\/s10207-024-00929-6","type":"journal-article","created":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T04:23:02Z","timestamp":1732767782000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Transferable channels for fair micropurchases"],"prefix":"10.1007","volume":"24","author":[{"given":"M. Magdalena","family":"Payeras-Capell\u00e0","sequence":"first","affiliation":[]},{"given":"Maci\u00e0","family":"Mut Puigserver","sequence":"additional","affiliation":[]},{"given":"Rosa","family":"Peric\u00e0s Gornals","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,28]]},"reference":[{"key":"929_CR1","unstructured":"Ali, S.T., Clarke, D., McCorry, P.: The nuts and bolts of micropayments: a survey, ArXiv, (2017), Vol. arXiv:1710.02964"},{"key":"929_CR2","doi-asserted-by":"publisher","unstructured":"Khan, N., Ahmad, T., State, R.: Blockchain-based micropayment systems: economic impact. IDEAS \u201919: Proceedings of the 23rd International Database Applications & Engineering Symposium. June (2019). pp. 1\u20133. https:\/\/doi.org\/10.1145\/3331076.3331096","DOI":"10.1145\/3331076.3331096"},{"issue":"2","key":"929_CR3","doi-asserted-by":"publisher","first-page":"54","DOI":"10.4018\/jaras.2013040103","volume":"4","author":"AP Isern-Dey\u00e0","year":"2013","unstructured":"Isern-Dey\u00e0, A.P., Payeras-Capell\u00e0, M.M., Mut-Puigserver, M., Ferrer-Gomila, J.L.: Anonymous and fair micropayment scheme with protection against coupon theft. Int. J. Adapt. Resil. Auton. Syst. (IJARAS) 4(2), 54\u201371 (2013). https:\/\/doi.org\/10.4018\/jaras.2013040103","journal-title":"Int. J. Adapt. Resil. Auton. Syst. (IJARAS)"},{"key":"929_CR4","doi-asserted-by":"crossref","unstructured":"Schmidt, C., M\u00fcller, R.: A framework for micropayment evaluation. NETNOMICS, (pp. 187\u2013200) (1999)","DOI":"10.1023\/A:1019110007282"},{"key":"929_CR5","unstructured":"Poutanen, T., Hinton, H., Stumm, M.: NetCents: a lightweight protocol for secure micropayments. In USENIX workshop on electronic commerce, (pp. 25\u201336) (1998)"},{"key":"929_CR6","unstructured":"Chien, H., Jan, J., Tseng, Y.: RSA-based partially blind signature with low computation. International conference on parallel and distributed systems ICPADS 2001, (pp. 385\u2013389) (2001)"},{"key":"929_CR7","volume-title":"PayWord and MicroMint: two simple micropayment schemes. International workshop on security protocols","author":"RL Rivest","year":"1996","unstructured":"Rivest, R.L., Shamir, A.: PayWord and MicroMint: two simple micropayment schemes. International workshop on security protocols. Springer, Berlin (1996)"},{"key":"929_CR8","unstructured":"Poon, J., and Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments. (2016)"},{"key":"929_CR9","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Yang, D.: RobustPay: robust payment routing protocol in blockchain-based payment channel networks, In: 2019 IEEE 27th international conference on network protocols (ICNP), (2019), pp. 1\u20134, https:\/\/doi.org\/10.1109\/ICNP.2019.8888094.","DOI":"10.1109\/ICNP.2019.8888094."},{"key":"929_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101892","volume":"96","author":"O Konashevych","year":"2020","unstructured":"Konashevych, O., Khovayko, O.: Randpay: the technology for blockchain micropayments and transactions which require recipient\u2019s consent. Comput. Secur. 96, 101892 (2020)","journal-title":"Comput. Secur."},{"key":"929_CR11","doi-asserted-by":"publisher","unstructured":"Takahashi T., Otsuka A.: Probabilistic micropayments with transferability. In: Bertino E., Shulman H., Waidner M. (eds) Computer Security - ESORICS 2021. ESORICS 2021. Lecture Notes in Computer Science, vol 12972. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88418-5_19","DOI":"10.1007\/978-3-030-88418-5_19"},{"key":"929_CR12","unstructured":"https:\/\/raiden.network\/"},{"key":"929_CR13","volume-title":"Financial cryptography and data security. FC 2019. Lecture notes in computer science","author":"M Elsheikh","year":"2020","unstructured":"Elsheikh, M., Clark, J., Youssef, A.M.: Short paper: deploying payword on ethereum. In: Bracciali, A., Clark, J., Pintore, F., R\u00f8nne, P., Sala, M. (eds.) Financial cryptography and data security. FC 2019. Lecture notes in computer science, vol. 11599. Springer, Cham (2020)"},{"key":"929_CR14","doi-asserted-by":"publisher","unstructured":"Galal H.S., ElSheikh M., Youssef A.M.: An Efficient Micropayment Channel on Ethereum. In: P\u00e9rez-Sol\u00e0 C., Navarro-Arribas G., Biryukov A., Garcia-Alfaro J. (eds) Data privacy management, cryptocurrencies and blockchain technology. DPM 2019, CBT 2019. Lecture notes in computer science, vol 11737. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-31500-9_13","DOI":"10.1007\/978-3-030-31500-9_13"},{"key":"929_CR15","doi-asserted-by":"publisher","unstructured":"Dziembowski, S., Eckey, L., Faust, S., Malinowski, D.: Perun: virtual payment hubs over cryptocurrencies. 106\u2013123 (2019). https:\/\/doi.org\/10.1109\/SP.2019.00020","DOI":"10.1109\/SP.2019.00020"},{"key":"929_CR16","doi-asserted-by":"publisher","unstructured":"McCorry, P., Bakshi, S., Bentov, I., Meiklejohn, S., Miller, A.: Pisa: arbitration outsourcing for state channels. 16\u201330 (2019). https:\/\/doi.org\/10.1145\/3318041.3355461","DOI":"10.1145\/3318041.3355461"},{"key":"929_CR17","doi-asserted-by":"publisher","unstructured":"Yang, L., Dong, X., Tong, W., Ma, S., Qiao, H., Xing, S.: Secure Off-chain payment in consortium blockchain system. Int. Conf. Netw. Netw. Appl. (NaNA) 2020, 259\u2013264 (2020). https:\/\/doi.org\/10.1109\/NaNA51271.2020.00051","DOI":"10.1109\/NaNA51271.2020.00051"},{"key":"929_CR18","doi-asserted-by":"publisher","unstructured":"Xu, M., Zhang, Y., Xu, F., Zhong, S.: Privacy-preserving optimal recovering for the nearly exhausted payment channels, In: 2021 IEEE\/ACM 29th international symposium on quality of service (IWQOS), (2021), pp. 1\u201310, https:\/\/doi.org\/10.1109\/IWQOS52092.2021.9521279.","DOI":"10.1109\/IWQOS52092.2021.9521279."},{"key":"929_CR19","unstructured":"Murray, P., Welch, N., Messerman, J.: EIP-1167: minimal proxy contract, ethereum improvement proposals, no. 1167, June 2018. [Online serial]. Available: https:\/\/eips.ethereum.org\/EIPS\/eip-1167"},{"key":"929_CR20","unstructured":"Kyt\u00f6joki, Jari, K\u00e4rpijoki, Vesa: Micropayments - Requirements and Solutions, (2000). http:\/\/www.cse.tkk.fi\/fi\/opinnot\/T-110.5290\/1999_Tik-110.501\/papers\/micropayments\/micropayments.html#sect3.2"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00929-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00929-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00929-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T00:21:24Z","timestamp":1739319684000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00929-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,28]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["929"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00929-6","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3793436\/v1","asserted-by":"object"}]},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,28]]},"assertion":[{"value":"28 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no Conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}}],"article-number":"34"}}