Abstract
With rapid development of information and communication technologies purchasing digital content through the Internet has been greatly increased. Therefore, secure and fair electronic payment systems are important issue. To reduce system computational, communication and storage costs in many existing electronic schemes, Yang et al. recently proposed a novel electronic payment system based on authenticated encryption technology. But, Chaudhry et al. showed that Yang et al.'s electronic payment system is vulnerable to impersonation attack. Furthermore, Chaudhry et al. proposed improved electronic payment system. But, in this paper we point that Chaudhry et al.'s improved electronic payment system does not satisfy anonymity and fairness properties and the dispute resolution means in Chaudhry et al.'s electronic payment system are not effective. Furthermore, combining authenticated encryption and verifiably encrypted signatures technologies, we propose an improvement on Chaudhry et al.'s electronic payment system. Compared with Chaudhry et al.'s electronic payment system, the major changes of the proposed electronic payment system are in exchange phase. In this phase the private key and public key of the user are not needed, and the user generates verifiably encrypted signatures on his payment voucher. These changes guarantee the user anonymity, eliminate the advantages of the merchant, ensure the fairness of the payment system and the effectiveness of the dispute resolution phase. We also give the comparisons of proposed electronic payment system with some existing electronic payment systems.
Introduction
In recent years, with rapid development of information and communication technologies purchasing digital content such as images, audio, and video through the Internet has been greatly increased. Therefore, secure electronic payment schemes as an integral part of any electronic commerce system are important for digital content transactions over the internet. After the first anonymous electronic payment scheme proposed by Chaum 1 many payment schemes were proposed.2–16
In a typical electronic payment scheme there are three participants: a user, a merchant, and a bank. Before one transaction, the user and the merchant must register with the bank, and open their account to benefit electronic payment. When the user wants to buy digital goods from the merchant, the user first gets a payment voucher (e-cash) from the bank. Then, he pays the payment voucher to the merchant. After verifying the validity of the payment voucher, the merchant sends the goods to the user, and sends the payment voucher to the bank, and the bank transfers money to the merchant's account. A secure well-designed electronic payment system should ensure the user's anonymity, fair exchange, and dispute resolution. The anonymity ensures the user's identity and purchasing information are confidential to the merchant and the bank, respectively. Fair exchange provides the guarantee that none of the participant has unfair advantage. To resolve the dispute caused by some participant who does not execute some terms of the protocol, a trusted third party (TTP) is needed in the payment system.
Recently, to reduce system computational, communication and storage costs in many existing electronic payment schemes, for resource constrained environments Yang et al. 17 proposed a novel authenticated encryption scheme and an electronic payment system based on their authenticated encryption scheme. But, Chaudhry et al. 18 and Heydari et al. 19 cryptanalyzed Yang et al.'s authenticated encryption scheme and electronic payment system and showed both to be vulnerable to impersonation attack. An adversary just having the knowledge of public parameters can impersonate as a legitimate user. The attacker can easily exploit the weakness of Yang et al.'s electronic payment scheme and can fraudulently purchase digital contents by deceiving the bank and merchant. Furthermore, Chaudhry et al. 18 improved both Yang et al.'s authenticated encryption scheme and electronic payment system. Chaudhry et al. claimed that the improved electronic payment system ensures robustness against all known attacks, while reducing about 66% computation cost on user side as compared to Yang et al.'s electronic payment scheme, and the improved electronic payment system is more suitable for resource constrained environments. But, in this paper we point that Chaudhry et al.'s electronic payment system does not satisfy the basic anonymity and fairness properties, and the dispute resolution means in Chaudhry et al.'s electronic payment system are not effective.
To contribute an anonymous and fair electronic payment system for digital contents, this paper, combining authenticated encryption and verifiably encrypted signatures technologies, 20 proposes an improved electronic payment system. Furthermore, the comparisons of security and computation cost of proposed electronic payment system with some existing electronic payment systems are given.
The remainder of this paper is organized as follows. Next section reviews Chaudhry et al.'s electronic payment system. Shortcomings of Chaudhry et al.'s electronic payment system are shown in “Shortcomings of Chaudhry et al.'s electronic payment system” section. “The proposed scheme” section proposes an improved fair electronic payment system. Security analysis is covered in “Security analysis of the proposed electronic payment system” section. The comparisons of security and computation cost are shown in “Comparisons” section. Finally conclusions are given in “Conclusion” section.
Brief review of Chaudhry et al.'s electronic payment system
Chaudhry et al.'s electronic payment system consists of six phases: initialization phase, buying phase, paying phase, exchange phase, transferring phase, and dispute resolution phase.
Initialization phase
During this phase, system selects finite field
Buying phase
This phase starts when a legal user U wants to purchase some electronic goods. Initially U downloads the goods information (
Here
Paying phase
Upon receiving the authenticated encrypted message tuple
Exchange phase
The exchange phase consists of following three steps:
Step 1: After receiving encrypted message, U first decrypts Step 2: Upon receiving Step 3: U decrypts
Transferring phase
M sends the payment proof to B before expiry date. U is having the facility to ask B to terminate the transaction if he did not receive the goods, in that case B transfers back the money from temporary account to U's account. After expiry date B transfers the money to M's account and removes
Dispute resolution phase
If user does not get the desired product or merchant do not get the correct payment voucher then they can initiate dispute resolution phase. A TTP is responsible for resolving the dispute, in either cases TTP will be given the merchant's private key to verify the correctness of key
TTP compares
Shortcomings of Chaudhry et al.'s electronic payment system
In this section, we discuss how Chaudhry et al.'s electronic payment system is subjected to the following three attacks.
The system cannot ensure user anonymity
In the exchange phase of Chaudhry et al.'s electronic payment system, in step 2 when the merchant M computes
The system does not satisfy the fairness property
The fairness property is an important property for digital content electronic payment system. In exchange phase of Chaudhry et al.'s electronic payment system, once the user sends
In the dispute resolution phase, TTP cannot effectively resolve the dispute among both customer and merchant
In the dispute resolution phase of Chaudhry et al.'s electronic payment system, the authors claimed that if the user does not get the desired product or the merchant does not get the correct payment voucher then they can beg TTP to resolve the dispute. Firstly, to resolve the dispute, TTP must get the merchant's private key. It is an obvious regrettable thing to expose private key for the merchant. Secondly, after obtaining the merchant's private key TTP must do lots of computation to verify if the customer and merchant are legal. Then TTP verifies the validity of the payment poof generated by the bank. This is clearly not an ideal dispute resolution means.
The proposed scheme
In this section, combining authenticated encryption and verifiably encrypted signatures technologies, we will improve Chaudhry et al.'s electronic payment system and propose a fair electronic payment system for digital content. In the proposed system, there are four participants: a user, a merchant, a bank, and a TTP. The proposed scheme consists of six phases: initialization phase, buying phase, paying phase, exchange phase, transferring phases, and dispute resolution phase. When the user wants to buy digital content from the merchant, he first asks a payment voucher from the bank. Then, the user generates a verifiably encrypted signature of the payment voucher and sends the verifiably encrypted signature to the merchant. After verifying the validity of the verifiably encrypted signature, the merchant sends the digital content to the user. After receiving the digital content, the user sends the payment voucher to the merchant. Before expiry date the merchant sends the payment voucher to the bank, and the bank transfers the money to the merchant's account. If there is a dispute between the user and the merchant in one transaction, they can initiate dispute resolution phase to ask TTP to resolve the dispute.
Compared with Chaudhry et al.'s electronic payment system, the major changes of the proposed electronic payment system are in exchange phase. In step 1 the private key of the user is not needed. So, in step 2 the public key of the user is not needed for the merchant's computation. Also in step 1 the user generates the verifiably encrypted signature on the payment voucher, and sends the verifiably encrypted signature instead of payment voucher itself to the merchant. These changes guarantee the user anonymity, eliminate the advantages of the merchant, ensure the effectiveness of the dispute resolution phase, and the fairness of the payment system.
Following is the detailed description of the proposed system.
Initialization phase
During this phase, system selects finite field
Buying phase
This phase starts when a legal user U wants to purchase some electronic goods. Initially U downloads
Paying phase
Upon receiving the authenticated encrypted message tuple
Exchange phase
The exchange phase consists of following four steps:
Step 1: U after receiving encrypted message, first decrypts Step 2: Upon receiving Step 3: U decrypts Step 4: M decrypts
Transferring phase
M sends the payment voucher
Dispute resolution phase
If the merchant does not get the correct payment voucher
If the user does not get the Electronic goods after he sends
Security analysis of the proposed electronic payment system
As Chaudhry et al.'s electronic payment system, the proposed electronic payment system ensures mutual authentication, confidentiality, integrity, resists replay attack, and double spending attack.
In the proposed electronic payment system all important messages transmitted include time stamps which in encrypted part cannot be altered by any adversary. So, the proposed electronic payment system can resist replay attack. In the proposed electronic payment system the user U sends
In this section, to aim at the shortcomings of Chaudhry et al.'s electronic payment system, we deal mainly with the anonymity and fairness of the proposed electronic payment system.
Anonymity
In the exchange phase, the user can securely communicate with the merchant by selecting a random number
Fairness issue
In the step 1 of the exchange phase, the user does not send the payment voucher
Comparisons
F1: anonymity; F2: replay attack; F3: impersonation attack; F4: double spending detection; F5: fairness.
Comparison of computation cost.
P1: buying phase; P2: paying phase; P3: exchanging phase, M: multiplication operation; I: inverse operation; L: scalar multiplication; H: hash computation; E: encryption operation; D: decryption operation; S: signature operation; V: signature verification operation.
In the security comparison, the proposed system is more secure than the three electronic payment systems.17–19 In comparison of computation cost with Yang et al. 17 in exchanging phase, there are more one signature operation, one encryption operation, and one decryption operation in the proposed electronic payment system. Compared with Chaudhry et al. 18 and Heydari et al., 19 in exchanging phase there are more two scalar multiplication operation, one signature operation, one encryption operation, one decryption operation and few two multiplication operation and one inverse operation in the proposed electronic payment system. The computation cost of the proposed electronic payment system is slightly higher. But, the proposed electronic payment system is more secure.
Conclusion
In this paper we point that Chaudhry et al.'s electronic payment system does not satisfy the anonymity and fairness properties and the dispute resolution means in Chaudhry et al.'s electronic payment system are not effective. Furthermore, based on verifiably encrypted signatures technique, this paper proposes an improved electronic payment system and compares the security and computation cost of the proposed electronic payment system with some existing electronic payment systems. The proposed system is more secure and suitable for resource constrained environments.
Footnotes
Acknowledgement
We would like to thank the reviewers for their helpful comments.
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: the Applied Basic and Advanced Technology Research Programs of Tianjin (No. 15JCYBJC15900).
