Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers

Research Article

An Efficient and Secure Micro-payment Transaction Using Shell Cryptography

Download
557 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-37949-9_40,
        author={Mayank Tiwari and Rajeshwar Kumar and Shaivya Jindal and Pankaj Sharma and Priyanshu},
        title={An Efficient and Secure Micro-payment Transaction Using Shell Cryptography},
        proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers},
        proceedings_a={QSHINE},
        year={2013},
        month={7},
        keywords={Micro payment double spending electronic commerce shell cryptography e cash Millicent man in the middle (MitM)},
        doi={10.1007/978-3-642-37949-9_40}
    }
    
  • Mayank Tiwari
    Rajeshwar Kumar
    Shaivya Jindal
    Pankaj Sharma
    Priyanshu
    Year: 2013
    An Efficient and Secure Micro-payment Transaction Using Shell Cryptography
    QSHINE
    Springer
    DOI: 10.1007/978-3-642-37949-9_40
Mayank Tiwari1,*, Rajeshwar Kumar1,*, Shaivya Jindal1,*, Pankaj Sharma1, Priyanshu1,*
  • 1: ABES Engineering College
*Contact email: mayank190590@gmail.com, rajyadav5191@gmail.com, shaivyajindal@gmail.com, priyanshu329@gmail.com

Abstract

The rapid growth of data communication networks in recent years has led to enormous development .electronic micro payment [6] is one of the most important topics in electronic commerce [4], particularly low cost online payment scenarios and offline payment in rural areas. In this paper we discuss some of the micro payment schemes, observe their merits and demerits and the propose micro payment scheme. we will use shell cryptography in lieu of public key cryptography in e cash schemes and provide security to the micro payment transactions. we compare the improved scheme with others and show that the improved scheme provide better security and efficiency, which enables the schemes viable for real world applications in particular, in resource constraint environment such as mobile payment through handheld devices or customers chip card for debit/credit transaction through point of sale terminal.