系統識別號 | U0002-1707200700342900 |
---|---|
DOI | 10.6846/TKU.2007.00486 |
論文名稱(中文) | 後付款匿名小額付款系統 |
論文名稱(英文) | An anonymous postpaid micropayment system |
第三語言論文名稱 | |
校院名稱 | 淡江大學 |
系所名稱(中文) | 資訊工程學系碩士班 |
系所名稱(英文) | Department of Computer Science and Information Engineering |
外國學位學校名稱 | |
外國學位學院名稱 | |
外國學位研究所名稱 | |
學年度 | 95 |
學期 | 2 |
出版年 | 96 |
研究生(中文) | 龐漢興 |
研究生(英文) | Han-Hsin Pang |
學號 | 694192385 |
學位類別 | 碩士 |
語言別 | 英文 |
第二語言別 | |
口試日期 | 2007-06-25 |
論文頁數 | 42頁 |
口試委員 |
指導教授
-
黃心嘉(sjhwang@mail.tku.edu.tw)
委員 - 黃仁俊(junhwang@ms35.hinet.net) 委員 - 顏嵩銘(yensm@csie.ncu.edu.tw) |
關鍵字(中) |
小額付款 匿名性 盲簽章 同時簽章 數位簽章 智慧卡 |
關鍵字(英) |
Micropayment Anonymity Blind Signatures Concurrent Signatures Digital Signatures Smart Cards |
第三語言關鍵字 | |
學科別分類 | |
中文摘要 |
匿名功能是保護消費者的個人交易資訊隱私的必要功能;後付款的方式對消費者較為便利,因為消費者可以享受先購買商品後付款的便利。Huang在2006年提出了後付款的匿名小額付款方法。但Huang的方法倚賴一個公正的中央銀行,它同時提供消費者的匿名性以及銀行的金融服務,但是建立與維護一個公正與安全的中央銀行,是一件困難且工程浩大的工作,因此Huang的方法在實現上有其困難。為了移除中央銀行這個角色,我們提出了一個具有匿名撤銷的後付款匿名小額付款方法。本研究不僅解決了Huang的方法的缺失,與Huang的方法相比較,並且提供較有效率與較可行的方法。不僅如此,本研究為首篇利用同時簽章法來提供消費者匿名的小額付款方法。 |
英文摘要 |
Anonymity is a necessary property for postpaid micropayment schemes to protect the customers’ privacy. The customers also gain the shopping convenience in postpaid way. In 2006, Huang first proposed an anonymous postpaid micropayment scheme that needs a trusted bank to provide customers’ anonymity and finance services. However, the building and maintenance of trusted banks causes the impracticality of Huang’s scheme. To remove trusted banks, a postpaid micropayment scheme with revocable customers’ anonymity is proposed. Our scheme not only overcomes the impractical frauds in Huang’s scheme but also is more efficient and practical than Huang’s scheme. Moreover, our scheme is the first micropayment scheme adopting concurrent signature schemes to provide customer anonymity. |
第三語言摘要 | |
論文目次 |
Contents Chapter 1 Introduction 1 Chapter 2 Review of Concurrent Signature Schemes 3 2.1 Concurrent Signature Algorithm 3 2.2 Concurrent Signature Protocol 4 Chapter 3 Model, Notations and Assumptions of Our Scheme 5 3.1 Model of Our Scheme 5 3.2 Notations 8 3.3 Assumptions 9 Chapter 4 Our New Scheme 10 4.1 Smart Card Generation Phase 10 4.2 Pseudonym Registration Phase 10 4.3 Account Registration Phase 11 4.4 Key Updating Phase 12 4.4.1 Key Updating Protocol: 12 4.5 Commitment Phase 13 4.5.1 Payword Chain Generation Protocol 13 4.6 Payment Phase 13 4.6.1 Payment Setup Protocol 13 4.6.2 Further Payment Protocol 14 4.7 Redemption Phase 14 4.7.1 Redemption Setup Protocol 14 4.7.2 Further Redemption Protocol 15 4.7.3 Recovery Protocol 15 4.8 Anonymous Revocation Phase 15 Chapter 5 Security Analysis 18 5.1 Double Spending Prevention 18 5.2 Unforgeability 18 5.3 Non-repudiation 18 5.4 Anonymity 19 5.5 Anonymity Revocation 19 Chapter 6 Comparisons 21 6.1 Comparison of Security Properties 21 6.2 Performance Analysis 22 Chapter 7 Conclusions 26 References 27 Appendix 29 List of Figures Figure 1: The Flowchart of Our Scheme 6 List of Tables Table 1. The Records in Each Entity’s Databases 17 Table 2: Security Property Comparison 22 Table 3: Computational Performance Comparison 25 |
參考文獻 |
[1] Anand, R. Sai and Madhavan, C. E. Veni, “An Online, Transferable E-Cash Payment System,” Advance in Cryptology – INDOCRYPT 2000, LNCS, Vol. 1977, New York: Springer-Verlag, 2000, pp. 93–103. [2] Bellare, M., Garay, J., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G. and Waidner, M., “iKP – A Family of Secure Electronic Payment Protocols,” Proceeding of 1st USENIX workshop on Electronic Commerce, 1995, pp. 89-106. [3] Brands, Stefan, “Untraceable Off-line Cash in Wallet with Observers,” Advances in Cryptology – CRYPTO ’93, LNCS, Vol. 773, New York: Springer-Verlag, 1993, pp. 302–318. [4] Chan, Agnes, Frankel, Yair, and Tsiounis, Yiannis, “Easy Come – Easy Go Divisible Cash,” Advances in Cryptology – EUROCRYPT ’98, LNCS, Vol. 1403, New York: Springer-Verlag, 1998, pp. 561–575. [5] Chaum, D., “Blind Signatures for Untraceable Payments,” Advances in Cryptography- Proceeding of Crypto ’82, New York: Springer-Verlag, 1983, pp. 199- 203. [6] Chaum, D., Fiat, A., and Naor, M., “Untraceable Electronic Cash,” Advances in Crytology – CRYPTO’88, LNCS, Vol. 403, New York: Springer-Verlag, 1988, pp. 21–25. [7] Chen, L., Caroline, Kudla and Kenneth, G. Paterson, “Concurrent Signatures,” Advances in Cryptology - EUROCRYPT 2004, LNCS, Vol. 3027, Berlin: Springer-Verlag, 2004, pp. 287–305. [8] Frankel, Yair, Tsiounis, Yiannis, and Yung, Moti, “Indirect Discourse Proofs: “Achieving Efficient Fair Off-Line E-Cash System,” Advance in Cryptology – ASIACRYPT ’96, LNCS, Vol. 1163, New York: Springer-Verlag, 1996, pp. 286–300. [9] Furche, A. and Wrightson, G., “SubScrip- An Efficient Protocol for Pay-Per-View Payments on the Interent,” Proc. 5th International Conference on Computer Communications and Networks (ICCCN ’96), Rockville, MD, Oct. 16-19, 1996. [10] Glassman, S., Manasse, M. S., Abadi, M., Gauthier, P., and Sobalvarro, P., “The Millicent Protocol for Inexpensive Electronic Commerce,” World Wide Web Journal, Proceeding of 4th International World Wide Web Conference, Boston, MA: O’Reilly, 1996, pp. 603–618. [11] Herberg, Amir, “Micropayment,” in Payment Technologies for E-Commerce, Kou, Weidong Ed., New York: Springer, 1998, pp. 245-282. [12] Huang, C.-W., “A Postpaid Micropayment Scheme with Revocable Customers’ Anonymity,” Master Thesis, Tamkang University, Taiwan, R.O.C, 2006. [13] Jakobossn, Markus and Yung, Moti, “Revokable and Versatile Electronic Money,” Proceeding of the 3rd ACM Conference on Computer and Communications Security, India: ACM press, 1996, pp.79–87. [14] Lin, S.-Y., “Design and Cryptanalysis of Micropayment Schemes,” Master Thesis, National Central University, Taiwan, R.O.C, 2004. [15] Manasee, M. S., “The Millicent Protocols for Electronic Commerce,” Proceeding of 1st USENIX workshop on Electronic Commerce, 1995, pp. 117–123. [16] MasterCard and VISA “Secure Electronic Transactions,” http://www.setco.org/ set.html [17] Mu, Yi, Nguyen, Khanh Quoc, and Varadharajan, Vijay, “A Fair Electronic Cash Scheme,” Topics in Electronic Commerce: Second International Symposium – ISEC 2001, LNCS, Vol. 2040, New York: Springer-Verlag, pp.20–32, 2001 [18] Neuman, B. C. and Medvinsky, G., “NetCheque, NetCash and the Characteristic of Internet Payment Services,” Proceeding of MIT Workshop on Internet Economics 1995, 1995. [19] Rivest, R. L. and Shamir, A., “PayWord and MicroMint: Two Simple Micropayment Schemes,” Proceeding of Security Protocols Workshop, LNCS 1189, New York: Springer-Verlag, 1997, pp. 69-87. [20] Sirbu, M. and Tyger, T. J., “NetBill: An Electronic Commerce System Optimized for Network Delivered Information and Services,” Proceeding of IEEE CompCon ’95, San Francisco, CA, USA, March 1995, pp. 20-25. [21] Stern, J. and Vaudenay, S., “SVP: A Flexible Micropayment Scheme,” Proceeding of Financial Cryptography, LNCS, Vol. 1318, New York: Springer-Verlag, 1997, pp. 161-172. [22] Tsiaris, T. and Sthephanides, G., “The Concept of Security and Trust in Electronic Payments,” Computers & Security, Vol. 24, Issue 1, pp. 10-15, 2005. [23] Tsou, J.-H., “The Study of Electronic Payment Scheme,” Master Thesis, Tamkang University, Taiwan, R.O.C, 2005. [24] Yen, S.-M., “PayFair: A Prepaid Internet Micropayment Scheme Ensuring Customer Fairness,” Computers and Digital Techniques, IEE Proceedings, Vol. 148, Issue 6, pp. 207–213, November 2001. |
論文全文使用權限 |
如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信