A secure and efficient payment protocol based on ElGamal cryptographic algorithms

被引:2
|
作者
Popescu, Constantin [1 ]
机构
[1] Univ Oradea, Dept Math & Comp Sci, Str Univ 1, Oradea, Romania
关键词
Electronic transactions; Payment protocol; Electronic coin; Signatures; Anonymity; DISCRETE LOGARITHM PROBLEM; E-CASH; ELECTRONIC CASH; DIGITAL-SIGNATURES; SCHEME; SYSTEM; IMPLEMENTATION;
D O I
10.1007/s10660-016-9236-5
中图分类号
F [经济];
学科分类号
02 ;
摘要
In this paper we present a secure and efficient transaction protocol that provides the anonymity and can detect the double spending. The proposed payment system is based on the ElGamal encryption scheme, the ElGamal signature scheme and the ElGamal blind signature protocol. We show that our transaction protocol is secure and efficient. We give the definitions of unlinkability and unforgeability of our security model and we prove that the proposed transaction protocol is unforgeable and satisfies the unlinkability property. We show that the proposed system is more efficient, in terms of the computation and communication cost, than the compared payment systems (Eslami et al. in Electron Commer Res Appl 10:59-66, 2011; Chen et al. in Electron Commer Res Appl 10:279-287, 2011; Liu et al. in Proceedings of second European PKI workshop: research and applications. Lecture notes in computer science, vol 3545, pp 206-214, 2005 and Chen et al. in Electron Commer Res Appl 10:673-682, 2011) for a customer who withdraws and spends an e-coin and for the merchant who verifies an electronic coin. Also, the proposed e-cash system is useful for the electronic transactions when the connection between the bank and the merchant is not available during the payment protocol. This means a less bandwidth of the payment protocol and then increases the speed of the electronic transaction.
引用
收藏
页码:339 / 358
页数:20
相关论文
共 50 条
  • [1] A secure and efficient payment protocol based on ElGamal cryptographic algorithms
    Constantin Popescu
    [J]. Electronic Commerce Research, 2018, 18 : 339 - 358
  • [2] Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions
    Adeniyi, Emmanuel A.
    Falola, Peace Busola
    Maashi, Mashael S.
    Aljebreen, Mohammed
    Bharany, Salil
    [J]. INFORMATION, 2022, 13 (10)
  • [3] Efficient and verifiable algorithms for secure outsourcing of cryptographic computations
    Mehmet Sabır Kiraz
    Osmanbey Uzunkol
    [J]. International Journal of Information Security, 2016, 15 : 519 - 537
  • [4] Efficient and secure hardwareFor cryptographic algorithms on embedded devices
    Ingrid Verbauwhede
    [J]. Datenschutz und Datensicherheit - DuD, 2012, 36 (12) : 872 - 875
  • [5] Efficient and verifiable algorithms for secure outsourcing of cryptographic computations
    Kiraz, Mehmet Sabir
    Uzunkol, Osmanbey
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (05) : 519 - 537
  • [6] Secure deniable authentication protocol based on ElGamal cryptography
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 36 - +
  • [7] Cryptographic protocol for payment transaction
    Cheng, CY
    Seman, K
    Yunus, J
    [J]. IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : B1 - B5
  • [8] Attacking ElGamal Based Cryptographic Algorithms Using Pollard's rho Algorithm
    Haraty, Ramzi A.
    Otrok, Hadi
    El-Kassar, A. N.
    [J]. 3RD ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, 2005, 2005,
  • [9] A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators
    Puckett, Steven
    Liu, Jianqing
    Yoo, Seong-Moo
    Morris, Thomas H.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (24) : 22143 - 22152