Abstract
An undeniable mobile billing system allows a mobile network service provider to bill its subscribers with trustworthy evidences. Chen, Jan and Chen proposed such a billing system by introducing a trusted third party – Observer and exploiting a hash chain mechanism. In their system, the Observer provides call time evidence to both cellular carriers and subscribers for billing. In this paper, we first identify some vulnerabilities in their mobile billing system. Then, we propose an undeniable billing scheme based on a proper combination of digital signature and hash chain mechanism. The proposed scheme can achieve authentication, non-repudiation, and fairness, which are desirable security requirements for an undeniable mobile billing system.
Project supported by the National Nature Science Foundation of China key project(No.90104005) and Specialized Research Fund for the Doctoral Program of Higher Education(No. 20050248043). The primary author’s work was done during his attachment to the Institute for Infocomm Research under its sponsorship.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bellare, M., Rogaway, P.: Minimizing the use of random oracles in authenticated encryption schemes. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 1–16. Springer, Heidelberg (1997)
Chen, L., Hitz, H.J., Horn, G., Howker, K., Kessler, V., Knudsen, L., Mitchell, C.J.: The use of trusted third parties and secure billing in umts. In: Proceedings of ACTS Mobile Telecommunications Summit, pp. 493–499, Granada (1996)
Chen, Y.-Y., Jan, J.-K., Chen, C.-L.: A fair and secure mobile billing system. Computer Networks 48(4), 517–524 (2005)
Martin, K.M., Preneel, B., Mitchell, C.J., Hitz, H.-J., Horn, G., Poliakova, A., Howard, P.: Secure billing for mobile information services in umts. In: Campolargo, M., Mullery, A. (eds.) IS&N 1998. LNCS, vol. 1430, pp. 535–548. Springer, Heidelberg (1998)
Shenker, S., Clark, D., Estrin, D., Herzog, S.: Pricing in computer networks: reshaping the research agenda. SIGCOMM Comput. Commun. Rev. 26(2), 19–43 (1996)
Zhou, J., Lam, K.-Y.: Undeniable billing in mobile communication. In: MobiCom ’98: Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, New York, USA, 1998, pp. 284–290. ACM Press, New York (1998)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, S., Wang, G., Zhou, J., Chen, K. (2007). Undeniable Mobile Billing Schemes. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds) Public Key Infrastructure. EuroPKI 2007. Lecture Notes in Computer Science, vol 4582. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73408-6_25
Download citation
DOI: https://doi.org/10.1007/978-3-540-73408-6_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73407-9
Online ISBN: 978-3-540-73408-6
eBook Packages: Computer ScienceComputer Science (R0)