Digital Certificate Based Security Payment for QR Code Applications

Slides:



Advertisements
Similar presentations
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E IEPG March 2000 APNIC Certificate Authority Status Report.
Advertisements

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC Open Policy Meeting SIG: Whois Database October 2000 APNIC Certificate Authority.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Online Security Tuesday April 8, 2003 Maxence Crossley.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
1 An ID-based multisignature scheme without reblocking and predetermined signing order Chin-Chen Chang, Iuon-Chang Lin, and Kwok-Yan Lam Computer Standards.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
DIGITAL SIGNATURE.
Using Public Key Cryptography Key management and public key infrastructures.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
QR Phishing Detection Aslihan Duman STM Savunma Teknolojileri Mühendislik ve Ticaret A.S. Role: S/T provider DS : Assurance and.
Chang, Wen-Hsi Division Director National Archives Administration, 2011/3/18/16:15-17: TELDAP International Conference.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Henric Johnson1 Secure Electronic Transactions An open encryption and security specification. Protect credit card transaction on the Internet. Companies.
Web Security.
TOPIC: HTTPS (Security protocol)
Presented by Edith Ngai MPhil Term 3 Presentation
Security of Digital Signatures
Cryptography: an overview
Cryptography: an overview
Grid Computing Security Mechanisms: the state-of-the-art
Security Outline Encryption Algorithms Authentication Protocols
Introducing CounterSign
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Computer Communication & Networks
Information Security message M one-way hash fingerprint f = H(M)
Cryptanalysis on Mu–Varadharajan's e-voting schemes
Section 12.1 Section 12.2 Discuss the functions of a Web site
Controlling Computer-Based Information Systems, Part II
B. R. Chandavarkar CSE Dept., NITK Surathkal
Uses Uses of cryptography Lab today on RSA
Identity-based deniable authentication protocol
S/MIME T ANANDHAN.
Privacy Preserving Ranked Multi-Keyword
Information Security message M one-way hash fingerprint f = H(M)
DIGITAL SIGNATURE CERTIFICATE SERVICE PROVIDER IN NOIDA DIGITAL CERTIFICATE.
Efficient CRT-Based RSA Cryptosystems
Pooja programmer,cse department
Secure Electronic Transaction (SET) University of Windsor
You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla
QR Code Authentication with Embedded Message Authentication Code
By Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun
Lecture 4 - Cryptography
Cryptography: an overview
A Framework of Remote Biometric Authentication on the Open Network
A Novel Latin Square-based Secret Sharing for M2M Communications
Authenticated QKD protocol using one-time ID
Lecture 6: Digital Signature
Install AD Certificate Services
Chapter -8 Digital Signatures
Hierarchical and Dynamic Large-Scale Railway-Track Modeling Method for High-Speed Train Real-Time Visual Simulation Good afternoon, first of all, let.
Chapter 29 Cryptography and Network Security
Unit 8 Network Security.
Digital Watermarking for Image Authentication with Localization
Published in 2016 International Computer Symposium (ICS) Authors
Electronic Payment Security Technologies
Cryptography Lecture 27.
Digital Signature Standard (DSS)
LAB 3: Digital Signature
Presentation transcript:

Digital Certificate Based Security Payment for QR Code Applications Jing Zhang, Shi-Jian Liu, Jeng-Shyang Pan, and Xiao-Rong Ji

Outline Introduction Problem Statement and Preliminaries Authenticated QR code based on Digital Signatures Experimental results Conclusions Q. & A.

Introduction In this increasingly interconnected world, it is the second nature for people to communicate, socialize and share information through a huge number of media platforms, often simultaneously. A rapidly growing social interaction technology is the use of Quick Response (QR) codes as physical shortcuts to Internet resources.

Introduction In the meanwhile, attacks also gain in conveniences from the popularity of QR codes, and the public should concern about the security of the widespread used QR codes. authentication mechanism merchant client

Contributions An authenticated QR code generating method is proposed in this paper, digital signatures techniques are involved to ensure the authentication. An authentication scheme is introduced, including the Certificate Authority based authentication mechanism and the way of certification based on the proposed QR code.

Outline Introduction Problem Statement and Preliminaries Authenticated QR code based on Digital Signatures Experimental results Conclusions Q. & A.

The QR standard [1] Information technology-Automatic identication and data capture techniques-QR Code 2005 bar code symbology specication, ISO/IEC 18004, (2006).

Outline Introduction Problem Statement and Preliminaries Authenticated QR code based on Digital Signatures Experimental results Conclusions Q. & A.

A three-phases basis workflow digital certificate generation authenticated QR code generation authenticated QR code certification The frame can be divided into three phases. The rst phase is named the digital certicate generation (Section 3.1), in this phase public and private keys are generated according to a authentication mechanism, which using the Public Key Infras- tructure (PKI) technology. The public key can be published with the designed Ph.2 Ph.3

P1. Digital certificate generation ID-based cryptography Certification Authorities (CA) private key public key : Keyword (merchant's identity)

P2. Authenticated QR code generation

P3. Authenticated QR code verification

Outline Introduction Problem Statement and Preliminaries Authenticated QR code based on Digital Signatures Experimental results Conclusions Q. & A.

Environments

Results All forged QR codes can be detected successfully. If the authentication fails, entrance of the web site through the URL will be forbidden, which can make sure the security of the QR code.

Outline Introduction Problem Statement and Preliminaries Authenticated QR code based on Digital Signatures Experimental results Conclusions Q. & A.

Conclusions Aiming for guarantee the QR Code based payment security, authenticated QR codes along with both the generating and resolving methods are proposed in this paper. Digital signatures techniques are involved to ensure the certificate information of goods delivered by QR code. One limitation of the proposed QR codes is that, since the signature is encoded along with the original message, a much larger capacity for QR code is required comparing with the traditional one.

Digital Certificate Based Security Payment for QR Code Applications Q. & A. Digital Certificate Based Security Payment for QR Code Applications Jing Zhang*, Shi-Jian Liu, Jeng-Shyang Pan, and Xiao-Rong Ji