Authors:Ching-Nung Yang and Hsu-Tun Teng Source:IEEE International Conference on E- Commerce, 2003(CEC 2003), 24-27 June 2003, Pages: 45 – 48 Date:2005/01/20.

Slides:



Advertisements
Similar presentations
Algorithms Chapter 15 Dynamic Programming - Rod
Advertisements

Introduction to Computer Science 2 Lecture 7: Extended binary trees
Optimal PRAM algorithms: Efficiency of concurrent writing “Computer science is no more about computers than astronomy is about telescopes.” Edsger Dijkstra.
Near-Duplicates Detection
Succinct Representation of Balanced Parentheses, Static Trees and Planar Graphs J. Ian Munro & Venkatesh Raman.
© 2014 Cengage Learning. All Rights Reserved.
Hashing Algorithm 羅正鴻 林彥廷 戴嘉宏.
PAYWORD, MICROMINT -TWO MICROPAYMENT SCHEMES PROJECT OF CS 265 SPRING, 2004 WRITTEN BY JIAN DAI.
Computer Science Dr. Peng NingCSC 774 Advanced Network Security1 Topic 3.2: Micro Payments.
Progressive Computation of The Min-Dist Optimal-Location Query Donghui Zhang, Yang Du, Tian Xia, Yufei Tao* Northeastern University * Chinese University.
Copyright 1996 RSA Data Security, Inc. All rights reserved.Revised 1/1/96 PayWord and MicroMint: Two Simple MicroPayment Schemes Ronald L. Rivest (MIT)
Micro-Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University URL:
1 A new identity based proxy signature scheme Source: Lecture Notes In Computer Science Author: Chunxiang Gu and Yuefei Zhu Presenter: 林志鴻.
Dean H. Lorenz, Danny Raz Operations Research Letter, Vol. 28, No
: My T-shirt suits me ★★★☆☆ 題組: Problem Set Archive with Online Judge 題號: : My T-shirt suits me 解題者:江秀桂 解題日期: 2007 年 6 月 5 日 題意:把 N 件 T-shirt.
: Flip Sort ★★☆☆☆ 題組: Problem Set Archive with Online Judge 題號: 10327: Flip Sort 解題者:歐子揚 解題日期: 2010 年 2 月 26 日 題意:在這個問題中使用一種排序方式 (Flip) ,意思就是 只能交換相鄰的.
1 -1 Chapter 1 Introduction Why to study algorithms? Sorting problem: To sort a set of elements into increasing or decreasing order. 11, 7, 14,
Index Structures Parin Shah Id:-207. Topics Introduction Structure of B-tree Features of B-tree Applications of B-trees Insertion into B-tree Deletion.
EVALUATING LIMITS ANALYTICALLY (1.3) September 20th, 2012.
Load Balancing for Partition-based Similarity Search Date : 2014/09/01 Author : Xun Tang, Maha Alabduljalil, Xin Jin, Tao Yang Source : SIGIR’14 Advisor.
A New High Speed, Low Power Adder; Using Hybrid Analog-Digital Circuit Taherinejad, N.; Abrishamifar, A.; Circuit Theory and Design, ECCTD 2009.
An Authenticated Payword Scheme without Public Key Cryptosystems Author: Chia-Chi Wu, Chin-Chen Chang, and Iuon-Chang Lin. Source: International Journal.
Pay-TV System with Strong Privacy and Non-Repudiation Protection Ronggong Song, Larry Korba IEEE Transactions on Consumer Electronics Vol.
Micropayments Revisited Background for Peppercoin scheme By Willer Travassos.
Graph Theory Chapter 7 Eulerian Graphs 大葉大學 (Da-Yeh Univ.) 資訊工程系 (Dept. CSIE) 黃鈴玲 (Lingling Huang)
Authors:Weimin Lang, Zongkai Yang, Gan Liu, Wenqing Cheng and Yunmeng Tan Source:Ninth International Symposium on Computers and Communications 2004, Proceedings.
REVERSIBLE AND HIGH- CAPACITY DATA HIDING IN MEDICAL IMAGES 報告學生:翁偉傑 1 Published in IET Image Processing Received on 25th June 2008 Revised on 15th June.
2010/05/061 Author: Monga, O.; Deriche, R.; Malandain, G.; Cocquerez, J.P. Source: Pattern Recognition, Proceedings., 10th International Conference,
MSRC: (M)icropayment (S)cheme with Ability to (R)eturn (C)hanges Source: Journal of Information Science and Engineering in review Presenter: Tsuei-Hung.
Maximizing Unavailability Interval for Energy Saving in IEEE e Wireless MANs Tuan-Che Chen ( 陳端哲 ), Ying-Yu Chen ( 陳盈佑 ), and Jyh-Cheng Chen ( 陳志成.
Efficient Backbone Construction Methods in MANETs Using Directional Antennas 1 Shuhui Yang, 1 Jie Wu, 2 Fei Dai 1 Department of Computer Science and Engineering.
A Secure Identification and Key Agreement Protocol with User Anonymity (SIKA) Authors: Kumar Mangipudi and Rajendra Katti Source: Computers & Security,
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Computer Networks Volume: 44, Issue: 2, February.
Module 9 Micropayment systems. Properties of micropayment systems Micropayments do not have a real-world cash equivalent – cash cannot be divided into.
Wireless Authentication Using Remote Passwords Authors: Andrew Harding, Timothy W. van der Horst, and Kent E. Seamons Source: Proceedings of the first.
Secret Sharing for General Access Structure İlker Nadi Bozkurt, Kamer Kaya, and Ali Aydın Selçuk Information Security and Cryptology, Ankara, Turkey, May.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Data Structures -3 rd test- 2015/06/01 授課教授:李錫智. Question 1 Suppose we use an array to implement a sorted list. Please answer the following questions.
BlindLocation: Supporting User Location Privacy in Mobile Database Using Blind Signature Source: Journal of Computer Science and Technology, reviewing.
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
A novel key management scheme for dynamic access control in a user hierarchy Authors: Tzer-Shyong Chen ( 陳澤雄 ) and Jen-Yan Huang Source: Applied Mathematics.
Lesson 11-2 Remainder & Factor Theorems Objectives Students will: Use synthetic division and the remainder theorem to find P(r) Determine whether a given.
© The McGraw-Hill Companies, Inc., Chapter 1 Introduction.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Part of a set or part of a whole. 3 4 =Numerator the number of parts = Denominator the number that equals the whole.
4.2 Critical Points Mon Oct 19 Do Now Find the derivative of each 1) 2)
An Efficient Index-based Protein Structure Database Searching Method 陳冠宇.
TOMIN: Trustworthy Mobile Cash with Expiration-date Attached Author: Rafael Martínez-Peláez and Francisco Rico-Novella. Source: Journal of Software, 2010,
多媒體網路安全實驗室 Private Information Retrieval Scheme Combined with E- Payment in Querying Valuable Information Date: Reporter: Chien-Wen Huang 出處:
Forward Secure Signatures on Smart Cards A. Hülsing, J. Buchmann, C. Busold | TU Darmstadt | A. Hülsing | 1.
Data Structures -3 rd exam- 授課教師 : 李錫智 教授. 1.[10] Please answer the following questions about queue: [ 2] What is the response of the statement: “(new.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
A Dynamic Indirect IP Lookup based on Prefix Relationships
AN ON-CHIP IP ADDRESS LOOKUP ALGORITHM
EEE2108: Programming for Engineers Chapter 8. Hashing
B+ Tree.
A flexible date-attachment scheme on e-cash
Practical E-Payment Scheme
© 2014 Cengage Learning. All Rights Reserved.
Experimenting with Electronic Commerce on the PalmPilot
© 2014 Cengage Learning. All Rights Reserved.
© 2014 Cengage Learning. All Rights Reserved.
© 2014 Cengage Learning. All Rights Reserved.
LESSON 9-5 Posting from a Cash Payments Journal
Dynamic Programming II DP over Intervals
Chapter 1 Introduction.
An Improved Wu-Manber Multiple Patterns Matching Algorithm
Presentation transcript:

Authors:Ching-Nung Yang and Hsu-Tun Teng Source:IEEE International Conference on E- Commerce, 2003(CEC 2003), June 2003, Pages: 45 – 48 Date:2005/01/20 Presenter: Jung-wen Lo( 駱榮問 ) An Efficient Method for Finding Minimum Hash Chain of Multi-Payword Chains in Micropayment

2 Outline Introduction Single-Payword Chain Multi-Payword Chain Preliminaries Strategies Example Comparison Conclusions Comments

3 Introduction Rivest & Shamir 1997 Netpay 1999 CustomerVendor 1. Pick w n 2. w 0 =h n (w n ); w i =h(w i+1 ) Payword: {w 0,w 1,…,w n } S(w 0 ) (i,w i ) w ’ 0 =h i (w i ) S(w ’ 0 )?=S(w 0 ) w 0 =h n (w n ) E PK V (S(ID C,w 0 )) ID C,(i,w i ) w ’ 0 =h i (w i ) S(w ’ 0 )?=S(w 0 ) CustomerBrokerVendor ID C,n,IP V E PK C ({w 0,w 1,…,w n }) ※ E PK ():PK Fct S():Signature

4 Introduction: Multi-Payword Chain Denomination: $1, $2, $3, $4, $5, $6 Payword roots: {w 10, w 20, w 30, w 40, w 50, w 60 } w ij =w( ij+1 ); j=n-1,n-2,…,0 & i=1,2,…,6 Ex. $16 = s1={w 61,w 62,w 41 }  Length=3 s2={w 11,w 12,w 13, w 14,w 15,w 16 }  Length=6 Problems (Aim) 1. How to find the minimal hash chain such that the number of hash operations can be reduced as small as possible.  Efficiency 2. How to let the payment be divided equally among every single chain in multi-payword chains such that every single chain has about equal length after each purchasing.  Future Efficiency

5 Preliminaries (1/2) : The number of partition of integer n ’ into m parts n ’ =a 1 +a 2 +a 3 +…+a m h ’ ≧ a 1 ≧ a 2 ≧ … ≧ a m ≧ l ’ : (b 1,b 2,…,b m )= (a 1 -(l ’ -1),a 2 -(l ’ -1),…,a m -(l ’ -1)) n=b 1 +b 2 +b 3 +…+b m =n ’ -m ×(l ’ -1) h=h ’ -l ’ +1 h ≧ b 1 ≧ b 2 ≧ … ≧ b m ≧ 1 can be reduced to Ex. Value 5 LengthNo.Item , ,

6 Preliminaries (2/2) Property 1: (or ) Property 2: Theorem 2.1. The m min of

7 Strategies Aggressive mode 1. Find the smallest parts of partitions (m min of ). 2. Keep the length of each payword chain as equal as possible from the partitions of step 1. Minimal hash operations.  Payword chains with large denomination size will be used up quickly. Balance mode 1. Select the partition results from all of the possible partitions (all possible values of m in ). 2. Keep the length of each payword chain as equal as possible from the possible partitions of step 1. Obtain the length of multi-payword chains for one payment as small as possible Spend each payword with the almost equal length.  Take more time

8 Example (1/2) Four payword chains: $2, $3, $4, $5 Payment=$16 Aggressive mode (b 1,b 2,b 3,b 4 )=(a 1 +1, a 2 +1, a 3 +1, a 4 +1) (5,4,4,3)  {w 11,w 32,w 41 } (5,5,4,2)  {w 11,w 31,w 42 }

9 Example (2/2) Balance mode Keeping the length of each payword chain as equal as possible from Table 3.2. (5,4,3,2,2)  {w 12,w 21,w 31,w 42 }

10 Comparison Rivest-Shamir’s schemeNetpay scheme ComputationStorageComputationStorage Broker Verify multi- payword Chains 1. Create multi- payword chains 2. Verify multi- payword Chains Customer 1. Create multi- payword chains 2. Find minimal multi-payword chains for one payment Store Multi- payword Chains Find minimal multi-payword chains for one Payment Store multi- payword chains Vendor Verify multi- payword chains

11 Conclusions Propose a new partition problems. Shows multi-payword chains with different values efficiently for Aggressive mode and Balance mode. The original single payword chain with h value is a special case of our payword scheme when use the partition.

12 Comments Implementation Aggressive mode: 大面額優先使用 Balance mode: 每一輪回中, 每種面額都儘可能的挑選 Balance mode provide future efficiency Total hash number won’t be changed Do not define m=0 Ex. or set i begin with 1