Authors:Weimin Lang, Zongkai Yang, Gan Liu, Wenqing Cheng and Yunmeng Tan Source:Ninth International Symposium on Computers and Communications 2004, Proceedings.

Slides:



Advertisements
Similar presentations
Internet payment systems
Advertisements

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
PAYWORD, MICROMINT -TWO MICROPAYMENT SCHEMES PROJECT OF CS 265 SPRING, 2004 WRITTEN BY JIAN DAI.
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
1 Secure Credit Card Transactions on an Untrusted Channel Source: Information Sciences in review Presenter: Tsuei-Hung Sun ( 孫翠鴻 ) Date: 2010/9/24.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Basic Banking Services - Activity 1
Digital Cash Present By Kevin, Hiren, Amit, Kai. What is Digital Cash?  A payment message bearing a digital signature which functions as a medium of.
Copyright 1996 RSA Data Security, Inc. All rights reserved.Revised 1/1/96 PayWord and MicroMint: Two Simple MicroPayment Schemes Ronald L. Rivest (MIT)
Slide 1 Vitaly Shmatikov CS 378 Digital Cash. slide 2 Digital Cash: Properties uDigital “payment message” with properties of cash uUnforgeable Users cannot.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Mutual Authentication and Key Exchange Protocol (MAKEP) Reporter: Jung-Wen Lo ( 駱榮問 ) Date: 2008/4/18.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
Micro-Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University URL:
1 Formal Specification and Verification of a Micropayment Protocol Alex X. Liu The University of Texas at Austin, U.S.A. October 13, 2004 Co-author: Mohamed.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS eCommerce Technology Lecture 10 Micropayments I.
A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce Source: Journal of Computers, Vol.19, No.1, April 2008 Author: Chin-Ling Chen,
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
1 A practical off-line digital money system with partially blind signatures based on the discrete logarithm problem From: IEICE TRANS. FUNDAMENTALS, VOL.E83-A,No.1.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS eCommerce Technology Lecture 10 Micropayments II.
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS eCommerce Technology Lecture 9 Micropayments I.
A Secure Mobile IP Authentication based on Identification Protocol Authors: Doo Ho Choi, Hyungon Kim and Kyoil Jung Source: International Symposium on.
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
Peppercorn Micropayments via better “Lottery Tickets” Ron Rivest (with Silvio Micali) MIT Laboratory for Computer Science Financial Cryptography Conference.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Chris Olston, cs294-7, Spring Atomicity in Electronic Commerce J. D. Tygar -- UCB presented by Chris Olston.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
1 Authentication and Digital Signature Schemes and Their Applications to E-commerce ( 身份認證與數位簽章技術及其在電子商務上的應用 ) Advisor: Chin-Chen Chang 1, 2 Student: Ya-Fen.
An Authenticated Payword Scheme without Public Key Cryptosystems Author: Chia-Chi Wu, Chin-Chen Chang, and Iuon-Chang Lin. Source: International Journal.
Pay-TV System with Strong Privacy and Non-Repudiation Protection Ronggong Song, Larry Korba IEEE Transactions on Consumer Electronics Vol.
Micropayments Revisited Background for Peppercoin scheme By Willer Travassos.
Authors:Ching-Nung Yang and Hsu-Tun Teng Source:IEEE International Conference on E- Commerce, 2003(CEC 2003), June 2003, Pages: 45 – 48 Date:2005/01/20.
How to Make E-cash with Non-Repudiation and Anonymity Ronggong Song, Larry Korba Proceedings of the International Conference on Information.
MSRC: (M)icropayment (S)cheme with Ability to (R)eturn (C)hanges Source: Journal of Information Science and Engineering in review Presenter: Tsuei-Hung.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
A Secure Identification and Key Agreement Protocol with User Anonymity (SIKA) Authors: Kumar Mangipudi and Rajendra Katti Source: Computers & Security,
2/16/001 E-commerce Systems Electronic Payment Systems.
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks Hyeran Mun, Kyusuk Han, Yan Sun Lee, Chan Yeob Yeun, Hyo.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Module 9 Micropayment systems. Properties of micropayment systems Micropayments do not have a real-world cash equivalent – cash cannot be divided into.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Micropayments Revisited Ronald L. Rivest (with Silvio Micali) MIT Laboratory for Computer Science RSA Conference 2002.
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
A Simple Traceable Pseudonym Certificate System for RSA-based PKI SCGroup Jinhae Kim.
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments Authors: Kui Ren, Wenjing Lou, Kwangjo Kim, and.
A novel key management scheme for dynamic access control in a user hierarchy Authors: Tzer-Shyong Chen ( 陳澤雄 ) and Jen-Yan Huang Source: Applied Mathematics.
Secure untraceable off-line electronic cash system Sharif University of Technology Scientia Iranica Volume 20, Issue 3, Pp. 637–646, June 2013 Baseri,
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Fall 2006CS 395: Computer Security1 Key Management.
TOMIN: Trustworthy Mobile Cash with Expiration-date Attached Author: Rafael Martínez-Peláez and Francisco Rico-Novella. Source: Journal of Software, 2010,
多媒體網路安全實驗室 Private Information Retrieval Scheme Combined with E- Payment in Querying Valuable Information Date: Reporter: Chien-Wen Huang 出處:
Meeting Reports  A new delegation-based authentication protocol for use in portable communication systems IEEE Transactions on Wireless Communications,
EMV Operation and Attacks Tyler Moore CS7403, University of Tulsa Reading: Anderson Security Engineering, Ch (136—138), (328—343) Papers.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
Micropayments Revisited
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
A flexible date-attachment scheme on e-cash
Practical E-Payment Scheme
Checking Services and Credit-Card Transactions
Electronic Commerce.
Checking Services and Credit-Card Transactions
Checking Services and Credit- Card Transactions
Presentation transcript:

Authors:Weimin Lang, Zongkai Yang, Gan Liu, Wenqing Cheng and Yunmeng Tan Source:Ninth International Symposium on Computers and Communications 2004, Proceedings on ISCC 2004, Volume 1, 28 June - 1 July 2004, Pages 50–55 Date:2005/05/05 Presenter: Jung-wen Lo( 駱榮問 ) A New Efficient Micropayment Scheme Against Overspanding

2 Outline Introduction PayWord Scheme New Scheme Example Performance Analysis Comments

3 Introduction Types On-line system Protect customers from Double Spending & Overspending Ex. Millicent. Off-line system More efficient Ex. PayWord Adachi et al.(2003) Customer certificate abuse attack => Cannot prevent double spending & Overspending New scheme Based on probabilistic polling Loss shared by bank and merchant

4 Adachi et al. scheme Title: The Security Problems of Rivest and Shamir's PayWord Scheme Authors: Adachi, N., Aoki, S., Komano, Y. and Ohta, K. Source: IEEE International Conference on E- Commerce, 2003(CEC 2003), June 2003, Pages: 20 – 23 When a customer exceeds his credit –Bank take full charge –Bank and shop share the damage Attacks: –Customer certificate abuse attack Use the same cetificate at another shop and exceed the credit –Bank falsification attack Bank damage the shops

5 PayWord Scheme Customer(C)Bank(B)Store(S) 1.Request 6.Verify M,C C 2.C C ={I B,I C,Addr C,PK C,E,Info} SK B E: Expired date Info: Information 3.Verify C C 4. Random w n w 0 =h n (w n ) w i-1 =h(w i ) 5.M={I S,C C,w 0,D,n} SK C 7.Order, (i,w i )8. h i (w i )?=w 0 9.Goods/Service 10. (i,w i ),M 11.Verify M,C C 12.Update DB ※ Payword n: {w 0,w 1, w 2, …, w n }

6 New Scheme(1/3) Bank(B) Customer(C) Cert C ={ID B,ID C,A C,PK C,Expiry,Add} SK B P C ={M C,X C,L C } ={10,0,{.}} Stage Bank Initialization Registration Withdraw M C =10 : Credit limit X C =0 : Counter of polling message L C ={.} : Merchants records Order Request f C =K/M C =5/10 =0.2 Cert C ={ID B,ID C,A C,PK C,Expiry,f C } SK B Random w n w 0 =H n (w n ) w i-1 =H(w i ) K=2 : Expect # of polling (eg.2-10) T=5: Threshold value for suspecting (eg.5-30)

7 New Scheme(2/3) Bank(B)Customer(C) Commit={ID M,Cert C,w 0,V C,Expiry,Add} SK C Merchant(M) Stage Payment ID C,V C X C =X C +1 IF X C <T=5 Otherwise Verify L C ← M (i,w i ) w 0 =h i (w i ) V C ×f C ≦ 1 Commit Acknowledgement Broadcast to L C Halt Accept V C =4: Dollar value of the payment IF X C <T Otherwise Acknowledgement Broadcast to L C Halt Accept Goods/Service Based on p=V C ×f C =V C ×K/M C =4×0.2 ≦ 1 V C ×f C >1 Halt

8 New Scheme(3/3) Bank(B)Customer(C)Merchant(M) Stage Deposit Loss shared by B and M all L C : M C ×X M /X C Compute Z C per day IF Z C >M C THEN Freeze C’s account (i,w i ),Commit Z C : Total value of the payments of C on a day X M : The number of M report

9 Performance Analysis Security No Forgery & Invalid spending => RSA cryptography & H() Overspending => Probabilistic polling Fairness Bank shares loss with merchant More fair than PayWord Efficiency Modest increase communication overhead Computational cost almost the same as PayWord Restricted Anonymity ID C is not the real identity => M cannot determine

10 Comments 結合 On-line & Off-line system 的優點 利用機率來進行 on-line check Performance 問題 Polling Broadcast to L C Bank 須紀錄 L C (Store List)