Publication details

 

Four Authorization Protocols for an Electronic Payment System

Basic information
Original title:Four Authorization Protocols for an Electronic Payment System
Authors:Roman Žilka, Václav Matyáš, Libor Kyncl
Further information
Citation:ŽILKA, Roman, Václav MATYÁŠ a Libor KYNCL. Four Authorization Protocols for an Electronic Payment System. In Zdenek Kotasek, Jan Bouda, Ivana Cerna, Lukas Sekanina, Tomas Vojnar, David Antos. Mathematical and Engineering Methods in Computer Science 2011, Springer LNCS 7119. Heidelberg: Springer Verlag, 2012. s. 205-214, 10 s. ISBN 978-3-642-25928-9. doi:10.1007/978-3-642-25929-6_19.Export BibTeX
@inproceedings{970726,
author = {Žilka, Roman and Matyáš, Václav and Kyncl, Libor},
address = {Heidelberg},
booktitle = {Mathematical and Engineering Methods in Computer Science 2011, Springer LNCS 7119},
doi = {http://dx.doi.org/10.1007/978-3-642-25929-6_19},
editor = {Zdenek Kotasek, Jan Bouda, Ivana Cerna, Lukas Sekanina, Tomas Vojnar, David Antos},
keywords = {payment protocol; micropayment; security protocol},
howpublished = {tištěná verze "print"},
language = {eng},
location = {Heidelberg},
isbn = {978-3-642-25928-9},
pages = {205-214},
publisher = {Springer Verlag},
title = {Four Authorization Protocols for an Electronic Payment System},
year = {2012}
}
Original language:English
Field:Informatics
Type:Article in Proceedings
Keywords:payment protocol; micropayment; security protocol

Over the recent years the Czech law has become quite liberal towards electronic payment systems dealing with low-value goods (``micropayments'') \cite{act284}. As of today, few businesses make use of the new legal facilities. This paper concerns a project aiming to support proliferation of the micropayment-based operations by creating a feature-rich, secure payment system with an open specification. More precisely, the key focus here will be payment authorization: as payments are carried out by an electronic device on a customer's behalf, there is a clear need for prevention of its abuse in case of theft. We introduce four original authorization protocols -- each suited to a different environment -- that prescribe the behavior of all relevant communicating devices and hopefully allow for secure and sound authorization.

Related projects: