Chair Professor Chin-Chen Chang Feng Chia University

Slides:



Advertisements
Similar presentations
Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
Advertisements

A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar 報告者 : 許睿中 日期 :
A simple remote user authentication scheme 1. M. S. Hwang, C. C. Lee and Y. L. Tang, “A simple remote user authentication.
An Improved Smart Card Based Password Authentication Scheme with Provable Security Source:Computer Standards & Interfaces, Vol. 31, No. 4, pp ,
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Copyright © 2002 Pearson Education, Inc. Slide 6-1.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Secure untraceable off-line electronic cash system Sharif University of Technology Scientia Iranica Volume 20, Issue 3, Pp. 637–646, June 2013 Baseri,
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
TOMIN: Trustworthy Mobile Cash with Expiration-date Attached Author: Rafael Martínez-Peláez and Francisco Rico-Novella. Source: Journal of Software, 2010,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
E-commerce Pay-pal and other concepts PayPal: The Money’s in the Class Discussion Why was it difficult for individuals to accept credit card payments.
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Source: The Journal of Systems and Software, Vol. 73, 2004, pp.507–514
無線環境的認證方法及其在電子商務應用之研究
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
Author:YongBin Zhou, ZhenFeng Zhang, and DengGuo Feng Presenter:戴士桀
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
A secure and traceable E-DRM system based on mobile device
Source : Future Generation Computer Systems, Vol. 68, pp , 2017
Efficient password authenticated key agreement using smart cards
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
Security of a Remote Users Authentication Scheme Using Smart Cards
Efficient Anonymous Cash Using the Hash Chain Member:劉岱穎,吳展奇,林智揚
Efficient Time-Bound Hierarchical Key Assignment Scheme
A New Classification Mechanism for Retinal Images
BY GAWARE S.R. DEPT.OF COMP.SCI
A flexible date-attachment scheme on e-cash
An Information Hiding Scheme Using Sudoku
Authors: Wei-Chi KU, Hao-Chuan TSAI, Maw-Jinn TSAUR
The Recent Developments in Visual Cryptography
Practical E-Payment Scheme
Privacy Preserving Ranked Multi-Keyword
Chapter 4 E-commerce Security and Payment.
Recent Developments on Multimedia and Secure Networking Technologies
Welcome To Money pad November 23, 2018 Sample footer.
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
The Recent Developments in Visual Secret Sharing
Hiding Data in a Color Palette Image with Hybrid Strategies
Source: Ad Hoc Networks, Vol. 71, pp , 2018
ELECTRONIC PAYMENT SYSTEM.
A Novel Latin Square-based Secret Sharing for M2M Communications
A Restricted Region-based Data-hiding Scheme
Security and Privacy in Pervasive/Ubiquitous Computing Systems
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
The New Developments in Visual Cryptography
Some Novel Steganographic Methods for Digital Images
A lightweight biometrics based remote user authentication scheme for IoT services Source: Journal of Information Security and Applications Volume 34, Part.
Information Steganography Using Magic Matrix
A Data Hiding Method for Text Documents Using Multiple-Base Encoding
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Hiding Information in VQ Index Tables with Reversibility
Authors: Yuh-Min TSENG, Tsu-Yang WU, Jui-DiWU
Chair Professor Chin-Chen Chang Feng Chia University
Recent Developments on Multimedia and Secure Networking Technologies
Chair Professor Chin-Chen Chang Feng Chia University
Source: Sensors, Volume 19, Issue 9 (May )
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Information Hiding Techniques Using Magic Matrix
Privacy Protection for E-Health Systems by
My Research Projects Chair Professor Chin-Chen Chang (張真誠)
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

The Design of E-Traveler’s Check with Efficiency and Mutual Authentication Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University http://msn.iecs.fcu.edu.tw/~ccc

Outline Introduction Proposed scheme Discussions Conclusions

Introduction (1/5) Why do we need the traveler’s check? Some risks in abroad travel Case 1 Freeze! Give me some money or costly goods. Don’t kill me! I give you all my own money. traveler robber

Introduction (2/5) Case 2 Where is my wallet? Shopping shop Walk fast traveler traveler traveler wallet

Introduction (3/5) Malicious guys may forge people’s credit cards I want to buy some goods. OK! Thank you. Forgery credit card Malicious man Sales man We need traveler’s check to mitigate possible risks

Introduction (4/5) Traditional traveler’s check Deposit equivalent payment to bank issuing checks Need to sign the traveler’s check and show their passport to the bank

Introduction (5/5) Two problems Forging the traveler’s check or the passport Impersonating the legal check holder

Proposed scheme (1/7) Low computations Mutual authentication

Proposed scheme (2/7) Registration Phase money Bank Traveler (User) (The check center) E-traveler’s check

Proposed scheme (3/7) Payment Phase E-traveler’s check Traveler (User) communicate Traveler (User) Bank (The check center) Hotel (The e-traveler’s check organization) cash

Proposed scheme (4/7) Notations IDi:identity of user i IDcc:identity of check center IDeco:identity of e-traveler’s check organization PWi:password of user i MONi:total money in the e-traveler’s check CASi:the cash that the user wants to cash the e-traveler’s check K1:the shared key between user and check center K2: the shared key between check center and e-traveler’s check organization T:timestamp EK:symmetric encryption with the secret key K

Proposed scheme (5/7) User bank Registration Phase Smart card Secure channel

Proposed scheme (6/7) Payment Phase Database User hotel bank

Proposed scheme (7/7) Payment Phase Database hotel bank User

Discussions (1/2) Requirements: The e-traveler’s check must have a unique identity The e-traveler’s check can only be generated by the check-issuing bank or the authorized organization with the applicant Only the legal check holder can have the e-traveler’s check cashed The check-issuing bank, the check-cashing organization, and the e-traveler’s check holder can authenticate one another

The e-traveler check organization Chang and Chang’s scheme* Discussions (2/2) Ui The e-traveler check organization (e.g. hotel) The check center (e.g. bank) Chang and Chang’s scheme* Our scheme EPK( ) :the public key encryption with PK Π:the multi-multiplication operation H( ) :one-way hash function EK( ) :the symmetric encryption with secret key K ⊕:XOR *: Chang, Y. F. and Chang, C. C., “E-traveler’s Checks with Reciprocal Authentication,” Journal of Electronic Commerce Research, Vol. 5, No. 2, pp. 128-135, 2004.

Conclusions Simple and efficient Mutual authentication