Professional Documents
Culture Documents
2
Information Technology Advisor, Iraqi Council of Representative
Bagdad, Iraq
3
Computer Information Systems, Al-Zaytoonah University of Jordan
Amman, Jordan
relatively shopping mall revenue from every hash chain. We then proposed a blind signature scheme
transaction. that will be used in the protocol for reaching better
As a result, expensive calculations such as digital efficiency without conceding its security characteristics.
signature should be limited in order to reduce the Therefore, before discussing the rest of this paper, we will
investments in software applications. In recent years, e- list the notation used as follows.
payments [2, 3] offering a relatively key improvement in U: User
the online revenue malls. The foundation of e-payments is M: Merchant
to take benefit of the high level of viewers by presenting B:
content for a low price. Other alternative of this thought is Bank
to rating fractions of cents for equally fractional contents p: Prime number
sums. The main features in e-payment protocol are less m: Message
charges of payment amount and high occurrence of d: Private Key
transactions on the e-commerce system. g: A generator of multiplicative group
e: Expiry information for redemption
2. E-Payment Scheme Requirements h: Secure hash function
MU,P = (Wi,i)
4. The Pay-Word Protocol Bank (B) Merchant (M)
[5] D. Chaum, Fiat, and M. Naor, "Untraceable electronic cash", from U.K. In 1990, he joined the institute of technical foundation,
Proceeding Advances in Cryptology, LNCS 403, Springer, in Iraq as an assistant professor and a head of computer system
1988, pp. 319-327. department. In 1993 he moved to Arab University College for
science and technology in Iraq as an associate professor and a
[6] M. Hwang, and P. Sung, "A study of micro-payment based dean deputy. In 1995 he joined the Philadelphia University in
on one-way hash chain", International Journal of Network Jordan as an associate professor and a chairman of computer
Security, Vol. 2, No. 2, 2006, pp 81-90. science and information system department. In 2004 he moved to
[7] R. Rivest, "Electronic lottery tickets as micropayments", the Amman Arab University for graduate studies, graduate college
Proceeding of the International Conference of Financial for computing studies as a professor. Then he moved to the
Cryptography, LNCS 1318, Springer, 1997, pp. 307314. department of computer information systems at the Middle East
University for graduate studies, Amman-Jordan as a professor.
[8] E. Foo, and C. Boyd, "A payment scheme using vouchers",
Currently, he is a advisor of information technology of the Iraqi
Proceeding of the International Conference of Financial Council of Representatives His research interests include areas
Cryptography, LNCS 1465, Springer, 1998, pp. 103-121. like public key cryptography, digital signatures, identification and
[9] M. Baddeley, "Using e-cash in the new economy: An authentication, software piracy, networks security, data base
economic analysis of micro-payment systems", security, e-commerce and e-learning security and algorithm
analyzes and design. He has supervised many PhD's and
Journal of Electronic Commerce Research, Vol. 5, masters degrees research thesis and projects of diverse areas.
No. 4, 2004. He has published more than 70 research papers in a multitude of
[10] J. Tellez, and J.Sierra, "Anonymous Payment in a Client international journals and conferences.
Centric Model for Digital Ecosystem", IEEE DEST, 2007,
pp. 422-427, Mustafa A. Al-Fayoumi received the
[11] R.Rivest, A. Shamir, and L. Adleman, "A Method for B.S. degree in computer science from
obtaining digital signatures and public-key cryptosystems", Yarmouk University, Irbid, Jordan, in
1988. He received the M.S. degree in
Communications of the ACM, Vol. 21, No. 2, 1978, pp. computer science from the University of
120-126. Jordan, Amman, Jordan, in 2003. In
[12] D.Stinson, Cryptography: Theory and Practice, CRT 2009, he received a Ph.D. degree in
Press, 2006. computer science from the Faculty of
[13] M. Al-Fayoumi, and S.J. Aboud, "Blind Decryption and Science and Technology at Anglia
Ruskin University, UK. In 2009, he joined
Privacy Protection", American Journal of Applied the Al-Zaytoonah University of Jordan, in
Sciences, Science Publications Vol.2, No. 4, 2005, pp. 873- Jordan, as an assistant professor. His research interests include
876. areas like computer Security, cryptography, identification and
authentication, Wireless and mobile Networks security, e-
application security, simulation and modeling, algorithm analyzes
and design, information retrieval and any other topics related to
Mohammad Al-Fayoumi received his
them. He has published about 10 research papers an international
B.S. degree in 1974. In 1977, he earned
journals and conferences.
his Master degree in mathematics, and a
postgraduate diploma in computer
science was received in 1979. A Ph.D.
was received in 1982 in the area of
computing science. The last two degrees
were awarded from Bucharest
University; he joined the Yarmouk
University, 1982 in Jordan, as an assistant professor and a head
of computer science department. In 1986 he moved to collage of
business studies in Kuwait and then moved back to Jordan in
Applied Science University as associate professor and a head of
computer science department. In 2005 he moved to the Middle
East University for Graduate Studies in Jordan as an associate
professor and a dean of information technology faculty, he
promoted to a professor rank in August, 2008. Currently, he is a
professor and advisor of graduate studies at the King Abdulaziz
University, Saudi Arabia. His research interests include areas of
information security, computer simulation, systems development,
e-commerce, e-learning and internet security and algorithm
analyzes and design. He has supervised many PhD's and
masters degrees research thesis and projects of diverse areas.
He has published more than 40 research papers in a multitude of
international journals and conferences, in addition to a nine books
in the area of computer sciences.