×

The general pay-word: A micro-payment scheme based on \(n\)-dimension one-way hash chain. (English) Zbl 1075.68595

Summary: In this paper, we extend the Pay-Word micro-payment scheme using the 1-dimension one-way hash chain to generate an \(n\)-dimension one-way hash chain. According to the system requirements, a user can flexibly choose the number of dimensions to gain the best time/space trade off. The proposed scheme is based on an \(n\)-dimension one-way hash chain, which can improve the efficiency of deriving the pay-words but also increase the temporary storage space. In addition, this scheme is fit for real-time payment.

MSC:

68P25 Data encryption (aspects in computer science)
PDFBibTeX XMLCite
Full Text: DOI

References:

[2] Coppersmith D. and Jakobsson M. Almost optimal hash sequence traversal, Financial Cryptography (FC’02), Lecture Notes in Computer Science, Springer-Verlag, (2002). · Zbl 1275.94025
[3] R.Hauser, M.Steiner and M.Waidner, Micro-payments based on iKP, in Proceedings of SECURICOM 96, 14th Worldwide Congresson Computer and Communication Security and Protection, (1996) pp.67–82.
[6] G.Itkis and L.Reyzin, Forward-secure signatures with optimal signing and verifing, Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science, Vol. 2139, Springer-Verlag, (2001) pp. 19–23. · Zbl 1003.94532
[7] M.Jakobsson, Fractal hash sequence representation and traversal, in Proceedings of the IEEE International Symposium on Information Theory (ISIT02), (2002) pp.437–444.
[8] C. S.Jutla and M.Yung, PayTree: Amoritized-Signature for Flexible MicroPayments, Second USENIX Workshop on Electronic Commerce, (1996) pp.213–221.
[9] NITS. Secure hash standard, Tech. Rep. FIPS 180-1, NITS, US Department Commerce, April (1995).
[10] T.Pedersen, Electronic payments of small amounts, in LNCS 1189, Proceedings of Security Protocols Workshop, (1997) pp.59–68.
[11] R.Rivest, The MD5 message digest algorithm, Tech. Rep. RFC 1321, April (1992).
[12] R.Rivest and A.Shamir, PayWord and MicroMint: Two simple micro payment schemes, in Proceedings of 1996 International Workshop on Security Protocols, (1996) pp.69–87.
[13] S.M. Yen, L.T. Ho and C.Y. Huang, Internet micropayment based on unbalanced one-way binary tree, in Proceedings of the Ninth National Conference on Information Security, (1999) pp.66–73.
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.