A flexible date-attachment scheme on e-cash

Slides:



Advertisements
Similar presentations
Internet payment systems
Advertisements

Design and Security Analysis of Marked Blind Signature
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Digital Cash Present By Kevin, Hiren, Amit, Kai. What is Digital Cash?  A payment message bearing a digital signature which functions as a medium of.
Slide 1 Vitaly Shmatikov CS 378 Digital Cash. slide 2 Digital Cash: Properties uDigital “payment message” with properties of cash uUnforgeable Users cannot.
Class 12 Anonymous Digital Currency CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
1 Blind Signatures 盲簽章 Chun-I Fan 范俊逸 E-Commerce & Security Engineering Lab. Department of Computer Science and Engineering National Sun Yat-Sen University.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
1 A practical off-line digital money system with partially blind signatures based on the discrete logarithm problem From: IEICE TRANS. FUNDAMENTALS, VOL.E83-A,No.1.
A New Multi-Proxy Multi- Signature Scheme Source: National Computer Symposium, vol. F, Taiwan, pp , 2001 Author: Shin-Jia Hwang and Chiu-Chin Chen.
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
Module 8 – Anonymous Digital Cash Blind Signatures DigiCash coins.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid Haiyong Bao Nanyang Technological University June.
An Authenticated Payword Scheme without Public Key Cryptosystems Author: Chia-Chi Wu, Chin-Chen Chang, and Iuon-Chang Lin. Source: International Journal.
Pay-TV System with Strong Privacy and Non-Repudiation Protection Ronggong Song, Larry Korba IEEE Transactions on Consumer Electronics Vol.
Topic 22: Digital Schemes (2)
Clemente-Cuervo et al. A PDA Implementation of an Off-line e-Cash Protocol.
Digital Cash. p2. OUTLINE  Properties  Scheme  Initialization  Creating a Coin  Spending the Coin  Depositing the Coin  Fraud Control  Anonymity.
Authors:Weimin Lang, Zongkai Yang, Gan Liu, Wenqing Cheng and Yunmeng Tan Source:Ninth International Symposium on Computers and Communications 2004, Proceedings.
How to Make E-cash with Non-Repudiation and Anonymity Ronggong Song, Larry Korba Proceedings of the International Conference on Information.
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
Electronic Cash R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
MSN lab1 A novel deniable authentication protocol using generalized ElGamal signature scheme Source: Information Sciences, vol. 177, pp , 2007.
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
RSA-based password authenticated key exchange protocol Presenter: Jung-wen Lo( 駱榮問 )
Secure untraceable off-line electronic cash system Sharif University of Technology Scientia Iranica Volume 20, Issue 3, Pp. 637–646, June 2013 Baseri,
BZUPAGES.COM E-cash Payment System A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of.
TOMIN: Trustworthy Mobile Cash with Expiration-date Attached Author: Rafael Martínez-Peláez and Francisco Rico-Novella. Source: Journal of Software, 2010,
多媒體網路安全實驗室 Private Information Retrieval Scheme Combined with E- Payment in Querying Valuable Information Date: Reporter: Chien-Wen Huang 出處:
多媒體網路安全實驗室 An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security Date:2012/02/16.
CS580 Internet Security Protocols Huiping Guo Department of Computer Science California State University, Los Angeles 6. Blind Signature.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
KNAPSACK公開金鑰密碼學 Algorithms FINITE DEFINITENESS INPUT/OUTPUT GENERALITY
Non-PKI Methods for Public Key Distribution
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Source: The Journal of Systems and Software, Vol. 73, 2004, pp.507–514
Proxy Blind Signature Scheme
Author : Guilin Wang Source : Information Processing Letters
第四章 數位簽章.
第四章 數位簽章.
Cryptanalysis on Mu–Varadharajan's e-voting schemes
A secure and traceable E-DRM system based on mobile device
Source : Future Generation Computer Systems, Vol. 68, pp , 2017
An efficient threshold RSA digital signature scheme
Certificateless signature revisited
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
SAKAWP: Simple Authenticated Key Agreement Protocol Based on Weil Pairing Authors: Eun-Jun Yoon and Kee-Young Yoo Src: International Conference on Convergence.
Security of a Remote Users Authentication Scheme Using Smart Cards
Efficient Anonymous Cash Using the Hash Chain Member:劉岱穎,吳展奇,林智揚
Identity-based deniable authentication protocol
Chair Professor Chin-Chen Chang Feng Chia University
Banking: Managing your money
Practical E-Payment Scheme
Internet Payment and DigiCash
Checking Services and Credit-Card Transactions
Source: Ad Hoc Networks, Vol. 71, pp , 2018
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
Checking Services and Credit-Card Transactions
Checking Services and Credit- Card Transactions
Presentation transcript:

A flexible date-attachment scheme on e-cash Authors: Chin-Chen Chang and Yeu-Pong Lai Source: Computers & Security, Vol. 22, No. 2, pp. 160-166, 2003 Reporter: Jung-Wen Lo(駱榮問) Date: 2004/08/26

Outline Introduction Review The proposed scheme Comparison Conclusions Online e-cash payment system Four Phases Review Chaum’s Untraceable electronic cash Fan et al.’s Date attachable electronic cash The proposed scheme Comparison Conclusions Comments

Introduction- Online e-cash payment system 2. Deduct Bank Databse 1. Withdraw 6. Deposit Bank 3. E_Cash 5. Deposit Customer 4. Pay E_Cash ※ Electronic cash scheme: Original: D. Chaum, 1990 Partially blind signature: Abe-Fujisaki, 1996 Date attached: Fan et al., 2000 Merchant

Four Phases Initializing Withdrawing Unblinding Depositing Bank RSA Public key pair Withdrawing Customer Withdrawal Blind signature Unblinding Unblinding signature Depositing Customer Pay money Merchant Deposit Bank Double spending check

Chaum’s Untraceable electronic cash Phase Bank Customer Merchant PK: (e, n) PV: d Initial Withdraw random r, m α=reH(m) mod n α t=αd mod n (deduct w) t s=r-1t mod n Unblind (m,s) Deposit se?≡H(m) mod n (m, s) Verify as Merchant (deposit w)

Fan et al.’s Date attachable electronic cash Phase Bank Customer Merchant PK: (e, n) PV: d Initial Withdraw C: random r, x1,…,x6 m=H100(x1)||H100(x2)||H12(x3)||H12(x4)||H31(x5)||H31(x6) α=reH(m) mod n α t=αd mod n (deduct w) t Unblind s=r-1t mod n C: α1=Ha(x1), α2=H100-a(x2), α3=Hb(x3), α4=H12-b(x4), α5=Hc(x5), α6=H31-c(x6) Deposit s,a,b,c,α1,α2, α3,α4,α5,α6 se?≡H(H100(α1)|| H100(α2)||H12(α3)|| H12(α4)||H31(α5)|| H31(α6)) mod n s,a,b,c,α1,α2, α3,α4,α5,α6 Verify as Merchant (deposit w)

The proposed scheme Phase Bank Customer Merchant PK: (e,n) ; (e*,n*) PV: d ; d* 1.Initial random r1, m α=r1eH(m) mod n 2.Withdraw α t1=αd mod n (deduct w) t1 s=r1-1t1 mod n β=r2e*G(s) mod n* β 3.Unblind ※δ(date slip) =Gd*(s) mod n* t2=βd* mod n t2 δ=r2-1t2 mod n* 4.Date-attach δe*?=G(s) mod n* s’ =Gd*(s||a||b||c) δ,s,(a,b,c) s’ (m,s,a,b,c),s’ 5.Deposit se?≡H(m) mod n s’ e*?≡G(s||a||b||c) mod n* (m,s,a,b,c),s’ Verify as Merchant (deposit w)

Comparison

Conclusions Untraceability Correctness Unforgeability Flexibility Phase 1, 2, 3 Bank knows customer but not e-cash (m,s) Phase 4, 5 No customer information but only e-cash Correctness Only original customer can modify date because only he knows δ Unforgeability Date is sealed in s’ and protected with G() and RSA scheme Merchant cannot forge e-cash because cannot drive m from s Flexibility The date can be change after e-cash has been deposited Customer and merchant agree to change date and customer redo Phase 4 and 5 to get a new s’

Comments Withdraw phase (Customer-Bank) Unconvenient: Use the whole money for once Channel is insecure Impersonation Cannot against interruption attack