淡江大學覺生紀念圖書館 (TKU Library)
進階搜尋


下載電子全文限經由淡江IP使用) 
系統識別號 U0002-1707200700342900
中文論文名稱 後付款匿名小額付款系統
英文論文名稱 An anonymous postpaid micropayment system
校院名稱 淡江大學
系所名稱(中) 資訊工程學系碩士班
系所名稱(英) Department of Computer Science and Information Engineering
學年度 95
學期 2
出版年 96
研究生中文姓名 龐漢興
研究生英文姓名 Han-Hsin Pang
學號 694192385
學位類別 碩士
語文別 英文
口試日期 2007-06-25
論文頁數 42頁
口試委員 指導教授-黃心嘉
委員-黃仁俊
委員-顏嵩銘
中文關鍵字 小額付款  匿名性  盲簽章  同時簽章  數位簽章  智慧卡 
英文關鍵字 Micropayment  Anonymity  Blind Signatures  Concurrent Signatures  Digital Signatures  Smart Cards 
學科別分類 學科別應用科學資訊工程
中文摘要 匿名功能是保護消費者的個人交易資訊隱私的必要功能;後付款的方式對消費者較為便利,因為消費者可以享受先購買商品後付款的便利。Huang在2006年提出了後付款的匿名小額付款方法。但Huang的方法倚賴一個公正的中央銀行,它同時提供消費者的匿名性以及銀行的金融服務,但是建立與維護一個公正與安全的中央銀行,是一件困難且工程浩大的工作,因此Huang的方法在實現上有其困難。為了移除中央銀行這個角色,我們提出了一個具有匿名撤銷的後付款匿名小額付款方法。本研究不僅解決了Huang的方法的缺失,與Huang的方法相比較,並且提供較有效率與較可行的方法。不僅如此,本研究為首篇利用同時簽章法來提供消費者匿名的小額付款方法。
英文摘要 Anonymity is a necessary property for postpaid micropayment schemes to protect the customers’ privacy. The customers also gain the shopping convenience in postpaid way. In 2006, Huang first proposed an anonymous postpaid micropayment scheme that needs a trusted bank to provide customers’ anonymity and finance services. However, the building and maintenance of trusted banks causes the impracticality of Huang’s scheme. To remove trusted banks, a postpaid micropayment scheme with revocable customers’ anonymity is proposed. Our scheme not only overcomes the impractical frauds in Huang’s scheme but also is more efficient and practical than Huang’s scheme. Moreover, our scheme is the first micropayment scheme adopting concurrent signature schemes to provide customer anonymity.
論文目次 Contents
Chapter 1 Introduction 1
Chapter 2 Review of Concurrent Signature Schemes 3
2.1 Concurrent Signature Algorithm 3
2.2 Concurrent Signature Protocol 4
Chapter 3 Model, Notations and Assumptions of Our Scheme 5
3.1 Model of Our Scheme 5
3.2 Notations 8
3.3 Assumptions 9
Chapter 4 Our New Scheme 10
4.1 Smart Card Generation Phase 10
4.2 Pseudonym Registration Phase 10
4.3 Account Registration Phase 11
4.4 Key Updating Phase 12
4.4.1 Key Updating Protocol: 12
4.5 Commitment Phase 13
4.5.1 Payword Chain Generation Protocol 13
4.6 Payment Phase 13
4.6.1 Payment Setup Protocol 13
4.6.2 Further Payment Protocol 14
4.7 Redemption Phase 14
4.7.1 Redemption Setup Protocol 14
4.7.2 Further Redemption Protocol 15
4.7.3 Recovery Protocol 15
4.8 Anonymous Revocation Phase 15
Chapter 5 Security Analysis 18
5.1 Double Spending Prevention 18
5.2 Unforgeability 18
5.3 Non-repudiation 18
5.4 Anonymity 19
5.5 Anonymity Revocation 19
Chapter 6 Comparisons 21
6.1 Comparison of Security Properties 21
6.2 Performance Analysis 22
Chapter 7 Conclusions 26
References 27
Appendix 29

List of Figures
Figure 1: The Flowchart of Our Scheme 6

List of Tables
Table 1. The Records in Each Entity’s Databases 17
Table 2: Security Property Comparison 22
Table 3: Computational Performance Comparison 25

參考文獻 [1] Anand, R. Sai and Madhavan, C. E. Veni, “An Online, Transferable E-Cash Payment System,” Advance in Cryptology – INDOCRYPT 2000, LNCS, Vol. 1977, New York: Springer-Verlag, 2000, pp. 93–103.
[2] Bellare, M., Garay, J., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G. and Waidner, M., “iKP – A Family of Secure Electronic Payment Protocols,” Proceeding of 1st USENIX workshop on Electronic Commerce, 1995, pp. 89-106.
[3] Brands, Stefan, “Untraceable Off-line Cash in Wallet with Observers,” Advances in Cryptology – CRYPTO ’93, LNCS, Vol. 773, New York: Springer-Verlag, 1993, pp. 302–318.
[4] Chan, Agnes, Frankel, Yair, and Tsiounis, Yiannis, “Easy Come – Easy Go Divisible Cash,” Advances in Cryptology – EUROCRYPT ’98, LNCS, Vol. 1403, New York: Springer-Verlag, 1998, pp. 561–575.
[5] Chaum, D., “Blind Signatures for Untraceable Payments,” Advances in Cryptography- Proceeding of Crypto ’82, New York: Springer-Verlag, 1983, pp. 199- 203.
[6] Chaum, D., Fiat, A., and Naor, M., “Untraceable Electronic Cash,” Advances in Crytology – CRYPTO’88, LNCS, Vol. 403, New York: Springer-Verlag, 1988, pp. 21–25.
[7] Chen, L., Caroline, Kudla and Kenneth, G. Paterson, “Concurrent Signatures,” Advances in Cryptology - EUROCRYPT 2004, LNCS, Vol. 3027, Berlin: Springer-Verlag, 2004, pp. 287–305.
[8] Frankel, Yair, Tsiounis, Yiannis, and Yung, Moti, “Indirect Discourse Proofs: “Achieving Efficient Fair Off-Line E-Cash System,” Advance in Cryptology – ASIACRYPT ’96, LNCS, Vol. 1163, New York: Springer-Verlag, 1996, pp. 286–300.
[9] Furche, A. and Wrightson, G., “SubScrip- An Efficient Protocol for Pay-Per-View Payments on the Interent,” Proc. 5th International Conference on Computer Communications and Networks (ICCCN ’96), Rockville, MD, Oct. 16-19, 1996.
[10] Glassman, S., Manasse, M. S., Abadi, M., Gauthier, P., and Sobalvarro, P., “The Millicent Protocol for Inexpensive Electronic Commerce,” World Wide Web Journal, Proceeding of 4th International World Wide Web Conference, Boston, MA: O’Reilly, 1996, pp. 603–618.
[11] Herberg, Amir, “Micropayment,” in Payment Technologies for E-Commerce, Kou, Weidong Ed., New York: Springer, 1998, pp. 245-282.
[12] Huang, C.-W., “A Postpaid Micropayment Scheme with Revocable Customers’ Anonymity,” Master Thesis, Tamkang University, Taiwan, R.O.C, 2006.
[13] Jakobossn, Markus and Yung, Moti, “Revokable and Versatile Electronic Money,” Proceeding of the 3rd ACM Conference on Computer and Communications Security, India: ACM press, 1996, pp.79–87.
[14] Lin, S.-Y., “Design and Cryptanalysis of Micropayment Schemes,” Master Thesis, National Central University, Taiwan, R.O.C, 2004.
[15] Manasee, M. S., “The Millicent Protocols for Electronic Commerce,” Proceeding of 1st USENIX workshop on Electronic Commerce, 1995, pp. 117–123.
[16] MasterCard and VISA “Secure Electronic Transactions,” http://www.setco.org/ set.html
[17] Mu, Yi, Nguyen, Khanh Quoc, and Varadharajan, Vijay, “A Fair Electronic Cash Scheme,” Topics in Electronic Commerce: Second International Symposium – ISEC 2001, LNCS, Vol. 2040, New York: Springer-Verlag, pp.20–32, 2001
[18] Neuman, B. C. and Medvinsky, G., “NetCheque, NetCash and the Characteristic of Internet Payment Services,” Proceeding of MIT Workshop on Internet Economics 1995, 1995.
[19] Rivest, R. L. and Shamir, A., “PayWord and MicroMint: Two Simple Micropayment Schemes,” Proceeding of Security Protocols Workshop, LNCS 1189, New York: Springer-Verlag, 1997, pp. 69-87.
[20] Sirbu, M. and Tyger, T. J., “NetBill: An Electronic Commerce System Optimized for Network Delivered Information and Services,” Proceeding of IEEE CompCon ’95, San Francisco, CA, USA, March 1995, pp. 20-25.
[21] Stern, J. and Vaudenay, S., “SVP: A Flexible Micropayment Scheme,” Proceeding of Financial Cryptography, LNCS, Vol. 1318, New York: Springer-Verlag, 1997, pp. 161-172.
[22] Tsiaris, T. and Sthephanides, G., “The Concept of Security and Trust in Electronic Payments,” Computers & Security, Vol. 24, Issue 1, pp. 10-15, 2005.
[23] Tsou, J.-H., “The Study of Electronic Payment Scheme,” Master Thesis, Tamkang University, Taiwan, R.O.C, 2005.
[24] Yen, S.-M., “PayFair: A Prepaid Internet Micropayment Scheme Ensuring Customer Fairness,” Computers and Digital Techniques, IEE Proceedings, Vol. 148, Issue 6, pp. 207–213, November 2001.
論文使用權限
  • 同意紙本無償授權給館內讀者為學術之目的重製使用,於2007-07-23公開。
  • 同意授權瀏覽/列印電子全文服務,於2007-07-23起公開。


  • 若您有任何疑問,請與我們聯絡!
    圖書館: 請來電 (02)2621-5656 轉 2281 或 來信