{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T19:30:25Z","timestamp":1673638225513},"reference-count":26,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4,1]]},"abstract":"<p>The development of new applications of electronic commerce (e-commerce) that require the payment of small amounts of money to purchase services or goods opens new challenges in the security and privacy fields. These payments are called micropayments and they provide a trade-off between efficiency and security requirements to pay low-value items. It is usual to assume low value fraud to achieve efficiency in micropayment systems. In this paper the authors present an improved version of an efficient and secure micropayment scheme which fulfils the security properties that guarantee no financial risk for merchants and the privacy of the customers. In addition, the proposed system defines a fair exchange between the coin and the desired good or service. In this fair exchange, the anonymity and untraceability of the customers are assured. Moreover, customers can request a refund whether they are no more interested on the services offered by merchants. As a novelty, an improvement of the scheme avoids customers to fraudulently use a refund operation to gain a little amount of money (called coupon). Thus, a new resolution subprotocol allows the merchant to avoid the loss of any single coupon.<\/p>","DOI":"10.4018\/jaras.2013040103","type":"journal-article","created":{"date-parts":[[2013,9,16]],"date-time":"2013-09-16T12:55:30Z","timestamp":1379336130000},"page":"54-71","source":"Crossref","is-referenced-by-count":1,"title":["Anonymous and Fair Micropayment Scheme with Protection against Coupon Theft"],"prefix":"10.4018","volume":"4","author":[{"given":"Andreu Pere","family":"Isern-Dey\u00e0","sequence":"first","affiliation":[{"name":"Department of Mathematics and Computer Science, Universitat de les Illes Balears, Palma, Spain"}]},{"given":"M. Magdalena","family":"Payeras-Capell\u00e0","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Universitat de les Illes Balears, Palma, Spain"}]},{"given":"Maci\u00e0","family":"Mut-Puigserver","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Universitat de les Illes Balears, Palma, Spain"}]},{"given":"Josep L.","family":"Ferrer-Gomila","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Universitat de les Illes Balears, Palma, Spain"}]}],"member":"2432","reference":[{"key":"jaras.2013040103-0","doi-asserted-by":"crossref","unstructured":"Abe, M., & Fujisaki, E. (1996). How to date blind signatures. In Proceedings of the Advances in Cryptology (ASIACRYPT '96) (LNCS 1163, pp. 244\u2013251).","DOI":"10.1007\/BFb0034851"},{"key":"jaras.2013040103-1","doi-asserted-by":"crossref","unstructured":"Abe, M., & Okamoto, T. (2000). Provably secure partially blind signatures. In Proceedings of the Advances in Cryptology (CRYPTO 2000) (LNCS 1880, (pp. 271\u2013286).","DOI":"10.1007\/3-540-44598-6_17"},{"key":"jaras.2013040103-2","doi-asserted-by":"publisher","DOI":"10.4067\/S0718-18762009000100008"},{"key":"jaras.2013040103-3","doi-asserted-by":"publisher","DOI":"10.1049\/el:20000163"},{"key":"jaras.2013040103-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.05.008"},{"key":"jaras.2013040103-5","doi-asserted-by":"crossref","unstructured":"Chaum, D. (1983). Blind signatures for untraceable payments. In Proceedings of Advances in Cryptology (Crypto 82) (pp. 199\u2013203)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"jaras.2013040103-6","doi-asserted-by":"crossref","unstructured":"Chien, H., Jan, J., & Tseng, Y. (2001). RSA-based partially blind signature with low computation. In Proceedings of the International Conference on Parallel and Distributed Systems (ICPADS 2001) (pp. 385\u2013389)","DOI":"10.1109\/ICPADS.2001.934844"},{"key":"jaras.2013040103-7","doi-asserted-by":"crossref","unstructured":"Chow, S., Hui, L., Yiu, S., & Chow, K. (2005). Two improved partially blind signature schemes from bilinear pairings. In Proceedings of the Information Security and Privacy (LNCS 3574, pp. 355\u2013411).","DOI":"10.1007\/11506157_27"},{"key":"jaras.2013040103-8","doi-asserted-by":"crossref","unstructured":"Esmaeeli, A., & Shajari, M. (2009). Mvpayword: Secure and efficient payword-based micropayment scheme. In Proceedings of the Second International Conference on the Applications of Digital Information and Web Technologies (ICADIWT '09) (pp. 609\u2013614).","DOI":"10.1109\/ICADIWT.2009.5273864"},{"key":"jaras.2013040103-9","doi-asserted-by":"publisher","DOI":"10.1016\/S0096-3003(03)00277-7"},{"key":"jaras.2013040103-10","doi-asserted-by":"crossref","unstructured":"Isern-Dey\u00e0, A. P., Payeras-Capell\u00e0, M., Mut-Puigserver, M., & Ferrer-Gomila, J. L. (2011). Untraceable, anonymous and fair micropayment scheme. In Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia (MoMM) (pp. 42\u201349).","DOI":"10.1145\/2095697.2095707"},{"key":"jaras.2013040103-11","doi-asserted-by":"crossref","unstructured":"Lipton, R., & Ostrovsky, R. (1998). Micro-payments via effcient coin-flipping. In Proceedings of the Financial Cryptography (LNCS 1465, pp. 1\u201315).","DOI":"10.1007\/BFb0055469"},{"key":"jaras.2013040103-12","doi-asserted-by":"crossref","unstructured":"Nan, J., Xiang-dong, L., Jing-ying, Z., & De-li, Y. (2009). A mobile micropayment protocol based onChaos. In Proceedigns of the 8th International Conference on Mobile Business (pp. 284\u2013289).","DOI":"10.1109\/ICMB.2009.55"},{"key":"jaras.2013040103-13","doi-asserted-by":"crossref","unstructured":"Nguyen, A., & Shao, X. (2008). A secure and efficient micropayment system. In Proceedings of the Advances in Computer and Information Sciences and Engineering (pp. 63\u201367).","DOI":"10.1007\/978-1-4020-8741-7_12"},{"key":"jaras.2013040103-14","doi-asserted-by":"crossref","unstructured":"Okamoto, T. (2006). Efficient blind and partially blind signatures without random oracles. Theory of Cryptography, pp. 80\u201399.","DOI":"10.1007\/11681878_5"},{"issue":"2","key":"jaras.2013040103-15","first-page":"99","article-title":"Evaluation of micropayment transaction costs.","volume":"5","author":"I.Papaefstathiou","year":"2004","journal-title":"Journal of Electronic Commerce Research"},{"key":"jaras.2013040103-16","unstructured":"Poutanen, T., Hinton, H., & Stumm, M. (1998). NetCents: A lightweight protocol for secure micropayments. In Proceedings of the USENIX Workshop on Electronic Commerce (pp. 25\u201336)."},{"key":"jaras.2013040103-17","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019110007282"},{"key":"jaras.2013040103-18","doi-asserted-by":"crossref","unstructured":"Tygar, J. D. (1996). Atomicity in electronic commerce. In Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing (PODC '96), New York, NY (pp. 8\u201326).","DOI":"10.1145\/248052.248054"},{"key":"jaras.2013040103-19","doi-asserted-by":"crossref","unstructured":"Wang, F., Dong, W., & Ji, Y. (2008). A new credit based micropayment scheme. In Proceedings of the IEEE International Conference on e-Business Engineering (pp. 596\u2013601).","DOI":"10.1109\/ICEBE.2008.62"},{"key":"jaras.2013040103-20","doi-asserted-by":"crossref","unstructured":"Wang, H., Ma, J., & Sun, J. (2009). Micro-payment protocol based on multiple hash chains. In Proceedings of the Second International Symposium on Electronic Commerce and Security (pp. 71\u201374).","DOI":"10.1109\/ISECS.2009.145"},{"key":"jaras.2013040103-21","doi-asserted-by":"crossref","unstructured":"Wu, Q., Susilo, W., Mu, Y., & Zhang, F. (2007). Efficient partially blind signatures with provable security. In Proceedings of the Computational Science and Its Applications (ICCSA 2007) (LNCS 4707, pp. 1096\u20131105).","DOI":"10.1007\/978-3-540-74484-9_96"},{"key":"jaras.2013040103-22","unstructured":"Yang, C. N., Lin, T., & Chen, T. S. (2005). Enhanced fair micropayment scheme based on hash chain to avoid merchant collusion. In Proceedings of the Consumer Electronics (ISCE 2005) (pp. 39\u201342)."},{"key":"jaras.2013040103-23","doi-asserted-by":"crossref","unstructured":"Yang, C. N., Wu, C. C., Chiu, C. Y., Chiou, S. Y., & Liao, W. C. (2009). Micropayment schemes with ability to return changes. In Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services (iiWAS '09) (pp. 356\u2013363).","DOI":"10.1145\/1806338.1806403"},{"key":"jaras.2013040103-24","doi-asserted-by":"crossref","unstructured":"Zhao, X., Lv, Y., & He, W. (2009). A novel micropayment scheme with complete anonymity. In Fifth International Conference on Information Assurance and Security (IAS '09) (pp. 638\u2013642).","DOI":"10.1109\/IAS.2009.314"},{"key":"jaras.2013040103-25","doi-asserted-by":"publisher","DOI":"10.1016\/S1007-0214(05)70077-8"}],"container-title":["International Journal of Adaptive, Resilient and Autonomic Systems"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=77632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:31:56Z","timestamp":1654115516000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jaras.2013040103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,4,1]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jaras.2013040103","relation":{},"ISSN":["1947-9220","1947-9239"],"issn-type":[{"value":"1947-9220","type":"print"},{"value":"1947-9239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,1]]}}}