FEIPS: A Secure Fair-Exchange Payment System for Internet Transactions

被引:6
作者
Djuric, Zoran [1 ]
Gasevic, Dragan [2 ]
机构
[1] Univ Banja Luka, Fac Elect Engn, Banja Luka 78000, Bosnia & Herceg
[2] Athabasca Univ, Sch Comp & Informat Syst, Athabasca, AB, Canada
关键词
payment system; fair exchange; security; cryptography; e-commerce; formal verification; PROTOCOL; VERIFICATION;
D O I
10.1093/comjnl/bxu120
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To be considered secure, a payment system needs to address a number of security issues. Besides fundamental security requirements, like confidentiality, data integrity, authentication and non-repudiation, another important requirement for a secure payment system is fair exchange. Many existing payment protocols require that customers must pay for products before their delivery (in the case of delivery of digital goods) or the delivery of the receipt (in the case of delivery of physical goods). This unfair situation should be eliminated afterward; that is, it is necessary to rebalance fairness for customers. To address these issues, we propose the Fair Exchange Internet Payment Protocol (FEIPS). The FEIPS protocol is designed for the payment of physical goods and falls into the category that uses a trusted third party for ensuring fair exchange. Although FEIPS has a strong emphasis on fair exchange, it still guarantees strong security properties, including confidentiality, data integrity, authentication and non-repudiation. The FEIPS protocol is designed to be simple and practical, unlike other similar protocols designed for the payment of physical goods. To demonstrate that FEIPS satisfies the desired properties, we perform a formal verification using the HLPSL language and the AVISPA tool.
引用
收藏
页码:2537 / 2556
页数:20
相关论文
共 73 条
[1]  
Alaraj A., 2007, ICDIM IEEE 2007, P248
[2]  
Alaraj AM, 2012, INT CONF MULTIMED, P939
[3]  
Alotaibi A., 2012, International Journal of Computer Networks & Communications, P307, DOI [10.5121/ijcnc.2012.4420, DOI 10.5121/IJCNC.2012.4420]
[4]  
[Anonymous], 2005, P APPSEM 2005 WORKSH
[5]  
[Anonymous], INTERNET COMMERCE DI
[6]   E-commerce: protecting purchaser privacy to enforce trust [J].
Antoniou, Giannakis ;
Batten, Lynn .
ELECTRONIC COMMERCE RESEARCH, 2011, 11 (04) :421-456
[7]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[8]   Automatic compilation of protocol insecurity problems into logic programming [J].
Armando, A ;
Compagna, L ;
Lierler, Y .
LOGICS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3229 :617-627
[9]  
Asokan N., 1997, P ACM CCS, P6
[10]  
ASOKAN N, 1998, THESIS U WATERLOO CA