Efficient Anonymous and Non-Repudiation E-Payment Protocol

Efficient Anonymous and Non-Repudiation E-Payment Protocol

Sattar J. Aboud
ISBN13: 9781615206353|ISBN10: 1615206353|EISBN13: 9781615206360
DOI: 10.4018/978-1-61520-635-3.ch002
Cite Chapter Cite Chapter

MLA

Aboud, Sattar J. "Efficient Anonymous and Non-Repudiation E-Payment Protocol." E-Banking and Emerging Multidisciplinary Processes: Social, Economical and Organizational Models, edited by Mohammad Ali Sarlak and Asghar Abolhasani Hastiani, IGI Global, 2011, pp. 17-33. https://doi.org/10.4018/978-1-61520-635-3.ch002

APA

Aboud, S. J. (2011). Efficient Anonymous and Non-Repudiation E-Payment Protocol. In M. Sarlak & A. Hastiani (Eds.), E-Banking and Emerging Multidisciplinary Processes: Social, Economical and Organizational Models (pp. 17-33). IGI Global. https://doi.org/10.4018/978-1-61520-635-3.ch002

Chicago

Aboud, Sattar J. "Efficient Anonymous and Non-Repudiation E-Payment Protocol." In E-Banking and Emerging Multidisciplinary Processes: Social, Economical and Organizational Models, edited by Mohammad Ali Sarlak and Asghar Abolhasani Hastiani, 17-33. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-61520-635-3.ch002

Export Reference

Mendeley
Favorite

Abstract

There are many proposals which offer anonymous and non-repudiation e-payment protocols. But they have the drawbacks that the anonymity can be misused fraudulently to perform a perfect crime. Currently, the hot research concentrates on the accepting of e-payment protocols where the anonymity of the coins is cancelable via a trusted authority in the case of criminal entities. In the chapter the author suggests an efficient protocol for e-payment schemes that offers a good level of security with appreciate to its efficiency. The proposed protocol prevents the blind office and the bank from impersonating an entity, so that the entity could not repudiate it when the entity misused a coin. Another benefit is that it is constructed from efficient cryptography schemes so that its security can simply be analyzed. The strength of this scheme is in its easiness. So, the author claims that the suggested protocol is more efficient than the existing schemes, since it allows to both a blind office and a bank to impersonate an entity to find and to spend a coin without to be noticed. It might cause a repudiation difficulty where the entity can repudiate his bad activities by proposing that both the bank and the blind office acted inaccurately. Other relevant issues related to the new protocol will be discussed in the section of the security of the scheme.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.