A Mobile Ticket System Based on Personal Trusted Device

Size: px
Start display at page:

Download "A Mobile Ticket System Based on Personal Trusted Device"

Transcription

1 A Mobile Ticket System Based on Personal Trusted Device Yu-Yi Chen 1, Chin-Ling Chen 2,* Jinn-Ke Jan 3 1. Department of Management Information Systems, National Chung Hsing University, Taichung, Taiwan 402, ROC. E_mail:chenyuyi@nchu.edu.tw 2. Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung, Taiwan 413, ROC. E_mail:clc@mail.cyut.edu.tw. 3. Institute of Computer Science, National Chung Hsing University, Taichung, Taiwan 402, ROC. E_mail:jkjan@cs.nchu.edu.tw * Coronding author: Assistant Professor Chin-Ling Chen Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung, Taiwan 413, R.O.C. Telephone number: Ext clc@mail.cyut.edu.tw

2 A Mobile Ticket System Based on Personal Trusted Device Yu-Yi Chen 1, Chin-Ling Chen 2,*, Jinn-Ke Jan 3 1. Department of Management Information Systems, National Chung Hsing University, Taichung, Taiwan 402, ROC. E_mail:chenyuyi@nchu.edu.tw 2. Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung, Taiwan 413, ROC. E_mail:clc@mail.cyut.edu.tw 3. Institute of Computer Science, National Chung Hsing University, Taichung, Taiwan 402, ROC. E_mail:jkjan@cs.nchu.edu.tw Abstract Advances in wireless network technology and the continuously increasing users of Personal Trusted Device (PTD) make the latter an ideal channel for offering personalized services to mobile users. In this paper, we apply some cryptology (such as public key infrastructure, hashing chain and digital signature) to propose a realistic mobile ticket system such that fairness, non-repudiation, anonymity, no forging, efficient verification, simplicity, practicability and obviate the embezzlement issues can be guaranteed. On the basis of PTD is more portable and personal than personal computer, we gradually perceived that the widely used PTD will present huge commerce profits for mobile ticket service provider and it is convenient to the PTD user. Keywords: Fairness, non repudiation, anonymity, hash chain, mobile ticket. * Coronding author. address: clc@mail.cyut.edu.tw (Chin-Ling Chen) 1

3 1. Introduction People use a convenient mobile device to conduct his or her business is becoming a universal phenomenon in modern society. Anybody can access various services via the Personal Trusted Device (PTD, such as mobile phone and personal digital assistant etc.) at anytime from anywhere. The PTD has contributed greatly to the rapid development of M-commerce. For example, people can use the PTD to access various services or buy some digital goods at anytime from anywhere. In Finland, people even can pay for their car wash by mobile phone calling. People use PTD as a payment tool has become a common practice in Helsinki, Finland the country with the highest per capita cell phone use. Up to now, many mobile commerce applications are closely linked our daily life. The ticket-based applications were widely accepted in current mobile environment. However, the PTD lack of computing power is an unalterable fact [1-4]. Any complex operations are not suitable for PTD. We review the current mobile transaction system [5-8], which is based on PTD, these applications almost neglect the important technology of digital signature. Thus, we are interesting to propose a mobile ticket system to meet the non-repudiation and fairness requirements. Base on our past research [9], we involved a coordinate role observer in this scheme to solve the similar problems such that the buyer and seller cannot deny the ticket transaction. The requirements of a mobile ticket-based system are similar to the micro payment system [10-14]. Most of the micro payment applications are designed into off-line model such that the server s bottleneck can be solved. Some articles focus on digital ticket issue [15-18] and propose the requirements for this kind of transaction. In 2

4 general and comprehensive viewpoint, we considered that a good mobile ticket-based system should meet the following requirements. (1) Fairness [19, 20]: A fair system must ensure that other parties will not gain any advantages over the correctly behaving player. (2) Non-repudiation [18, 21-23]: Non-repudiation services protect the transacting parties against any false denial that a particular event or action has taken place, in which evidence will be generated, collected and maintained to enable the settlement of disputes. (3) Anonymity [15, 18]: There is no private information of the subscriber is disclosed to the ticket issuer or verifier. (4) No forging [10, 16]: A mobile ticket cannot be forged. (5) Efficiency ticket verification [16]: Ticket verification must be fast. (6) Simplicity [10]: Because of the weak computing power of the PTD, the PTD operations should be designed as simple as possible. (7) Practicability [16]: A useful protocol of the mobile ticket should be easily applied to current mobile communication system. (8) Obviate the embezzlement: A mobile ticket cannot be illegally used. The rest of this paper is organized as follows. In Section 2, we present our scheme for mobile ticket protocol. In Section 3, we analyze the requirements of the proposed protocol. We make our conclusions in Section Our Scheme 2.1 The Participating Parties and Notation In this section, we will introduce our protocol how to work. We depict the participating parties and coordinate messages of the whole process shortly in Figure. 1. 3

5 Observer 4 Subscriber erifier Phase I : Ticket Request 1.The Subscriber establishes a communication channel with the, and proposes a mobile ticket request. 2. generates a unique transaction number, signs the ticket request, and then sends the request to the. Phase II : Ticket Issue 3. The verifies the s signature for this transaction, and generates a mobile ticket. 4. The Observer authenticates the Subscriber s request, verifies the and s signature, and then generates the onse signature for the. 5. The Observer generates the hidden mobile ticket for the Subscriber. It also forwards the hidden mobile ticket and the onse signature to the. 6. The verifies the Observer s signature and forwards the hidden mobile ticket to the Subscriber s PTD. The Subscriber reveals the hidden mobile ticket. Phase III: Ticket erification 7. The Subscriber carries the PTD, which stored the mobile ticket, to request the related service. The erifier verifies the mobile ticket. 8. The erifier uploads the used ticket to the in batch processing. Figure 1. The participating parties in a ticket transaction and coordinate messages of whole process There are five parties be involved in our scheme as follows. Subscriber (S): People who uses the personal trusted device to purchase a mobile ticket. Observer (OBS): A trusted web site, which is the agent of the Subscriber. Mobile Network Service Provider (): A mobile network service provider that provides a secure, stable wireless network and manages the transaction bill. Ticket Service Provider (): A mobile ticket service provider, which cooperates with the to provide the ticket-based service and issue a mobile ticket. 4

6 erifier (): A mobile ticket verifier, which is designated to play a s agent to verify the subscriber s qualification and provides related service. In our scheme, we involve a key role of Observer to coordinate the mobile transaction. This method integrates some cryptology such as public key infrastructure, hash chain and digital signature. Now we introduce the notation be used in our scheme as follows. : concatenate operation. + : additive operation. - : subtractive operation. : exclusive-or operation. H( ) : a one-way hash function. TK req : the ticket request. TK inf o : the ticket information, which is issued by the. It includes ticket title, serial number, issuing time, valid period, price and program. ID X : the identity of the X. SP i TN i S X ( ) X ( ) M x SG X : the subscriber-pseudonym that is coordinated by subscriber and observer. : the transaction number. : the signature function using the X s secret key to sign. : the verify function using the X s public key to verify. : the x intension message, such as M req, M, M tran etc. : the X s signature. 2.2 The Detailed Protocol Initially, the Subscriber and Observer pre-coordinate a set of hashing chain a 0, a 1,..., a n, where a 0 is a random seed, a 1 =H(a 0 ), a 2 =H(a 1 ),..., a n =H(a n-1 ). Afterward, 5

7 they can use these hashing values to authenticate message each other during the mobile ticket transaction. Phase I : Ticket Request Step 1: The Subscriber makes a ticket request Tk req, which is concatenated with the identities of ID and ID OBS. M = req ( TK req ID IDOBS i SP ) And the Subscriber uses the pre-coordinated hashing values a n and a n-1 to compute the following value X req. X = M a + a req req n n-1 The X, M ) message is then sent to the. ( req req Step 2: Suppose the Subscriber is authenticated, the generates a unique transaction number TN i for this request. M tran = ( M req TNi) The uses its secret key to sign M tran as follows. SG = S ( M tran ) Then the sends X, M, SG ) to the. ( req tran Phase II : Ticket Issue Step 3: The uses the s public key to verify the received signature. tran Then the records the signature for this request and generates a ticket information TK info for this transaction. 6

8 M = ( M tran TKinf o) Afterward, the uses its secret key to sign M as follows. SG = S M ( ) The coronding message M, SG, X, SG ) is sent to the ( req Observer. Step 4: The Observer gets the Subscriber s pseudonym SP i from M req. According to the SP i, the Observer applies the pre-coordinated hashing values a n and n 1 a to authenticate the Subscriber s request message M req. req n n 1 req ( M a + a ) = X The Observer also gets M tran from M to verify the following signatures for this transaction. tran Only all of the above equalities are held, the Observer can make sure this transaction is agreed by the Subscriber, the, and the. Then the Observer uses its secret key to sign M as follows. SG ( ) OBS = SOBS M The Observer sends back SG to the. OBS Step 5: Moreover, the Observer uses the next pair of hashing values a n 1 and an 2 to generate the onse message X for the Subscriber. 7

9 X + = ( SG ) an 1 an-2 The Observer sends X,M,SG ) to the. ( OBS Step 6: The uses the Observer s public key to verify the received signature. OBS OBS Afterward, the forwards M, X ) to the Subscriber s PTD, and ( records X, X M, SG, SG ) in the Subscriber s bill. ( req, OBS Later, the Subscriber can use the same next pair of hashing values a n 1 and an 2 to reveal the signature SG as follows. SG = n ( X an 2) a 1 Phase III: Ticket erification Step 7: The Subscriber carries the PTD, which stored the mobile ticket M, X ) ( to request the erifier to provide the related service. Afterward, the erifier uses the s public key to verify the ticket as follows. Only pass the above verification, the Subscriber s request would be accepted. Step 8: The erifier uploads the used tickets to the in batch processing periodically for the double-spending detection. 3. Analysis We have proposed a mobile ticket protocol based on the personal trusted device. Now we will examine if the aforesaid requirements are satisfied. 3.1 Fairness Issue 8

10 In traditional commercial behavior, the fairness means to achieve the aim of cash on delivery. However, this is a difficult goal for web transaction. To ensure that other parties will not gain any advantages over the correctly behaving party. It is always designed that the buyer and seller receive proof of each other during the transaction scenarios in E-commerce. Therefore, a digital signature is used to generate the verifiable proof of each related party. However, it is not suitable for mobile device transactions. For this reason, we involve a trusted Observer to coordinate the transaction such that a fair transaction platform can be established. First, the Subscriber makes ticket request M req to ask the to enable this transaction. The then signs a signature SG for fairness in the ticket request phase. M tran = ( M req TNi) SG = S ( M tran ) Since the receives and verifies the signature SG, the cannot deny the SG, and then enables this request. tran Second as we mentioned, we involve the Observer to coordinate the transaction for fairness. The Observer acts as an agent to determine if the Subscriber, the and the agree this transaction. The Observer can verify the following equalities. req n n 1 req ( M a + a ) = X tran After verifying the mobile ticket, the Observer acts as an agent to generate a 9

11 signature SG OBS. SG OBS = SOBS ( M ) Both of the and receive this proof; the Subscriber only got the mobile ticket. Finally, the Subscriber got a valid mobile ticket that including the signature SG. Thus the cannot refuse to provide the coronding ticket service. 3.2 Non-repudiation Issue Non-repudiation means that the request party provides related proof (such as a digital signature) for the other party to verify that each transaction will not suffer from any false denial. In E-commerce applications, the digital signature is often used to solve the non-repudiation issue. In this section, we will focus on illustrating the non-repudiation proof for the interested party during the transaction. With each party holding related proof issued by the opposite party, our scheme will not suffer from repudiation during the transaction. In Table 1, we illustrate the non-repudiation proofs during each phase. Table 1. The non-repudiation proofs of each phase Non-repudiation proof Proof issuer Proof holder erification ( M tran, SG ) tran ( OBS M, SG ) Observer, ( M, SG ) Observer, Subscriber OBS OBS 1. After the Subscriber makes a ticket request, the signs the signature SG for the request. Since the receives and verifies the s signature SG, 10

12 the cannot deny SG, and then enable this request. 2. Since the Observer verified the agreement and issued the signature SG OBS for the and. The Subscriber also cannot deny this transaction. 3. Since the mobile ticket M, ) is issued and signed by the, the ( SG cannot refuse to provide the coronding service. 3.3 Anonymity Issue In our scheme, the Subscriber s identity will not be revealed to the or erifier during the transaction. Our scheme will not suffer from anonymity issue. 3.4 No Forging Issue No one can generate the valid mobile ticket signature M, SG ) except the (. It is actually infeasible for anyone to forge the signature SG without knowing the s secret key. 3.5 Efficient Ticket erification Issue A practical mobile ticket system should be designed in off-line verification model. In our scheme, the erifier can independently verify the mobile ticket ( M, SG ) as follows. In regard to the double spending verification of the ticket, it is the s onsibility. 3.6 Simplicity Issue The trusted Observer is involved to coordinate the transaction such that the 11

13 traditional encryption, decryption and digital signature still can be applied in our system. The PTD only performs simple operation (such as additive operation, subtractive operation and exclusive-or operation); it can be easily implemented into current PTD hardware. 3.7 Practicability Issue We proposed scenarios that include the ticket request, issue and verification phase for a mobile ticket infrastructure. Our scheme meets important issues about the ticket system. It is easily applied to current mobile system and network without need of extra infrastructures. 3.8 Obviate the Embezzlement Issue As the mobile ticket is forwarded from the Observer to the Subscriber, the signature SG is hidden by the hashing chain values a n 1 and an 2, the mobile ticket cannot be embezzled by the. 4. Conclusions With the omnipresent availability of PTD, M-commerce has a promise future in B2C market particularly. The PTD is becoming extremely popular tool for people to conduct his or her business at anytime from anywhere. In fact, it provides more portable, personal, flexible and dynamic environment than personal computer. Such application has become an attractive business area. In this paper, we overcome the weakness of the PTD lacks of computing power and involve a trusted Observer to solve some practical problems such that fairness, non-repudiation, anonymity, no forging, efficient verification, simplicity, practicability and obviate the embezzlement issues can be guaranteed. 12

14 Acknowledgements This research was supported by National Science Council, Taiwan, R.O.C., under contract number NSC E References [1] S. S. Grosche and H. Knospe, Secure Mobile Commerce, Electronics & Communication Engineering Journal, ol. 14, No. 5, pp , [2] A. Tsalgatidou and E. Pitoura, Business Models and Transactions in Mobile Electronic Commerce: Requirements and Properties, Computer Networks 37(2), pp , [3] A. Tsalgatidou, J. eijalainen and E. Pitoura, Challenge in Mobile Electronic Commerce, Proceeding of IeC 2000, 3 rd Int. Conference On Innovation through E-Commerce, UK, Nov , [4] J. eijalainen,. Terziyan and H. Tirri, Transaction Management for M-Commerce at a Mobile Terminal, Proceedings of the 36 th Annual Hawaii International Conference on System Sciences, 6-9 Jan Page(s):10. [5] B. Ozen and O. Kilic, Highly Personalized Information Delivery to Mobile Clients, Wireless Networks 10(6), pp , [6] N. M. Sadeh, T. Chan, L. an, O. Kwon and K. Takizawa, A Semantic Web Environment for Context-Aware M-Commerce, Proceedings of the 4 th ACM conference on Electronic commerce, San Diego, CA, USA, 2003, pp [7] G. Shih and S. S.Y. Shim, A Service Management Framework for M-Commerce Applications, Mobile Networks and Applications 7(3), pp , [8] Z. Trabelsi, S. Cha, D. Desai, C. Tappert, A oice and Ink XML Multimodal Architecture for Mobile E-commerce Systems, International Conference on Mobile Computing and Networking, Proceedings of the 2nd international 13

15 workshop on Mobile commerce table of contents, Atlanta, Georgia, USA, 2002, pp [9] Yu-Yi Chen, Jinn-Ke Jan, and Chin-Ling Chen, A Fair and Secure Mobile Billing System, Computer Networks, ol. 48, No. 4, pp , [10] K. Fujimura and Y. Nakajima, General-purpose Digital Ticket Framework, 3 rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, Aug. 31-Sep. 3, 1998, pp [11] M. Lee and K. Kim, A Micro-payment System for Multiple-Shopping, The 2002 Symposium on Cryptography and Information Security (SCIS 2002), Shirahama, Japan, Jan. 29-Feb.1, [12] M. S. Manasse, The Millicent Protocol for Electronic Commerce, Proceedings of the 1st USENIX Workshop on Electronic Commerce, Jul , New York, NY, [13] T. P. Pedersen, Electronic Payments of Small Amounts, Proceedings of Cambridge Workshop on Security Protocols, LNCS 1189, pp.59-68, [14] R. L. Rivest and A. Shamir, PayWord and MicroMint: Two Simple Micropayment Schemes, CryptoBytes, 2(1), pp.7-11, [15] L. Buttyan and J. P. Hubaux, Accountable Anonymous Access to Services in Mobile Communication Systems, Proceedings of the 18 th IEEE Symposium on Reliable Distributed Systems (SRDS 99), Workshop on Electronic Commerce, 1999, pp [16] A. Mana, J. Martinez, S. Matamoros and J. M. Troya, GSM-Ticket: Generic Secure Mobile Ticket Service, GEMPLUS Developer Conference, Paris, France, 2001, pp.1-7. [17] B. Patel and J. Crowcroft, Ticket Based Service Access for the Mobile User, Proceedings of the Third Annual ACM/IEEE International Conference on Mobile 14

16 Computing and Networking, Budapest, Hungary, 1997, pp [18] H. Wang, J. Cao and Y. Zhang, Ticket-based Service Scheme for Mobile Users, the 25 th Australian Computer Science Conference (ACSC2002), Conference in Research and Practice in Information Technology, Melbourne, Australia, 2002, pp [19] N. Asokan,. Shoup and M. Waidner, Asynchronous Protocols for Optimistic Fair Exchange, Proceedings of the IEEE Symposium on Research in Security and Privacy, pp.86-99, [20] N. Asokan,. Shoup and M. Waidner, Optimistic Fair Exchange of Digital Signatures, IEEE Journal on Selected Areas in Communications, 18(4), pp , [21] T. Coffey, P. Saidha, Non-repudiation with Mandatory Proof Receipt, ACM SIGCOMM Computer Communication Review, 26(1), [22] B. Cox, J. D. Tygar and M. Sirbu, NetBill Security and Transaction Protocol, Proceedings of the First USENIX Workshop on Electronic Commerce, July 11 12, New York, NY, [23] J. Zhou and D. Gollmann, Observations on Non-repudiation, Lecture Notes in Computer Science 1163, Advances in Cryptology: Proceedings of Asiacrypt 96, Kyongju, Korea, pp ,

17 Author Biographies Yu-Yi Chen was born in Kaohsiung, Taiwan, in He received the B.S., M.S., and Ph.D. in Applied Mathematics from the National Chung Hsing University in 1991, 1993, and 1998, ectively. He is presently an assistant professor of the Department of Management Information Systems, National Chung Hsing University, Taiwan. His research interests include computer cryptography, network security, and e-commerce. Chin-Ling Chen was born in Taiwan in He received the B.S. degree in Computer Science and Engineering from the Feng Cha University in 1991; the M.S. degree and Ph.D. in Applied Mathematics at National Chung Hsing University, Taichung, Taiwan, in 1999 and 2005 ectively. He is a member of the Chinese Association for Information Security. From 1979 to 2005, he was a senior engineer at the Chunghwa Telecom Co., Ltd. He is currently an assistant professor of the Department of Computer Science and Information Engineering at Chaoyang University of Technology, Taiwan. His research interests include cryptography, network security and electronic commerce. Jinn-Ke Jan was born in Taiwan in He received the B.S. degree in physics from the Catholic Fu Jen University in 1974 and the M.S. degree in information and computer science from University of Tokyo in He studied Software Engineering and Human-Computer Interface in the University of Maryland, College Park, MD, during He is presently a professor in the institute of Computer Science at National Chung Hsing University. He is currently also an editor of Information and Education, an editor of Journal of Computers, and an executive member of the Chinese Association for Information Security. He is a member of IACR and member of IEEE. From 1995 to 1997, he was the Director of the Counseling Office for Overseas Chinese and Foreign Students. From 1997 to 2000, he was the Director of the Computer Center at National Chung Hsing University. His research interests include computer cryptography, human factors of designing software and information systems, ideograms I/O processing, data structures and coding theory. 16

18 Observer 4 Subscriber erifier Phase I : Ticket Request 1.The Subscriber establishes a communication channel with the, and proposes a mobile ticket request. 2. generates a unique transaction number, signs the ticket request, and then sends the request to the. Phase II : Ticket Issue 3. The verifies the s signature for this transaction, and generates a mobile ticket. 4. The Observer authenticates the Subscriber s request, verifies the and s signature, and then generates the onse signature for the. 5. The Observer generates the hidden mobile ticket for the Subscriber. It also forwards the hidden mobile ticket and the onse signature to the. 6. The verifies the Observer s signature and forwards the hidden mobile ticket to the Subscriber s PTD. The Subscriber reveals the hidden mobile ticket. Phase III: Ticket erification 7. The Subscriber carries the PTD, which stored the mobile ticket, to request the related service. The erifier verifies the mobile ticket. 8. The erifier uploads the used ticket to the in batch processing. Figure 1. The participating parties in a ticket transaction and coordinate messages of whole process Table 1. The non-repudiation proofs of each phase Non-repudiation proof Proof issuer Proof holder erification ( tran SG M, ) ( OBS M, SG ) Observer, OBS OBS tran ( SG M, ) Observer, Subscriber 17

Application of Electronic Currency on the Online Payment System like PayPal

Application of Electronic Currency on the Online Payment System like PayPal Application of Electronic Currency on the Online Payment System like PayPal Rafael Martínez Peláez, Francisco J. Rico Novella Technical University of Catalonia (UPC), Department of Telematics Engineering

More information

Construction of a Real-Time and Secure Mobile Ticket System

Construction of a Real-Time and Secure Mobile Ticket System JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 25, 807-825 (2009) Construction of a Real-Time and Secure Mobile Ticket System CHIN-LING CHEN 1, YEONG-LIN LAI 2, CHIH-CHENG CHEN 2 AND KUN-CHIH CHEN 1 1

More information

A Secure Anonymous E-Voting System based on Discrete Logarithm Problem

A Secure Anonymous E-Voting System based on Discrete Logarithm Problem Appl. Math. Inf. Sci. 8, No. 5, 2571-2578 (2014) 2571 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/080556 A Secure Anonymous E-Voting System based

More information

A Scheme for Analyzing Electronic Payment Systems

A Scheme for Analyzing Electronic Payment Systems A Scheme for Analyzing Electronic Payment Systems Lucas de Carvalho Ferreira IC/Unicamp and DEX/UFLA DEX, Campus da UFLA 37200-000 Lavras MG Brasil lucasf@ufla.br Ricardo Dahab IC/Unicamp Caixa Postal

More information

Securing digital signatures for non-repudiation

Securing digital signatures for non-repudiation J. Computer Communications 22 (1999) 710 716 Securing digital signatures for non-repudiation J. Zhou a, *, K.Y. Lam b a Kent Ridge Digital Labs, 21 Heng Mui Keng Terrace, Singapore 119613, Singapore b

More information

A Survey on Optimistic Fair Digital Signature Exchange Protocols

A Survey on Optimistic Fair Digital Signature Exchange Protocols A Survey on Optimistic Fair Digital Signature Exchange s Alfin Abraham Vinodh Ewards Harlay Maria Mathew Abstract Security services become crucial to many applications such as e-commerce payment protocols,

More information

Fair Exchange in E-commerce

Fair Exchange in E-commerce Fair Exchange in E-commerce INDRAJIT RAY and INDRAKSHI RAY Department of Computer Science Colorado State University Many business transactions over the Internet involve the exchange of digital products

More information

Electronic Contract Signing without Using Trusted Third Party

Electronic Contract Signing without Using Trusted Third Party Electronic Contract Signing without Using Trusted Third Party Zhiguo Wan 1, Robert H. Deng 2 and David Lee 1 Sim Kim Boon Institute for Financial Economics 1, School of Information Science 2, Singapore

More information

An Anonymous Fair Exchange E-commerce Protocol

An Anonymous Fair Exchange E-commerce Protocol An Anonymous Fair Exchange E-commerce Protocol Indrakshi Ray Indrajit Ray Department of Computer and Information Science University of Michigan-Dearborn 490 Evergreen Road, Dearborn, MI 488 Email: iray,

More information

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,

More information

An Internet Based Anonymous Electronic Cash System

An Internet Based Anonymous Electronic Cash System Research Paper American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-4, Issue-4, pp-148-152 www.ajer.org Open Access An Internet Based Anonymous Electronic Cash System

More information

D I G I T A L - T I C K E T - C O N T R O L L E D D I G I T A L T I C K E T C I R C U L A T I O N

D I G I T A L - T I C K E T - C O N T R O L L E D D I G I T A L T I C K E T C I R C U L A T I O N The following paper was originally published in the Proceedings of the 8 th USENIX Security Symposium Washington, D.C., USA, August 23 26, 1999 D I G I T A L - T I C K E T - C O N T R O L L E D D I G I

More information

A secure mobile payment system *

A secure mobile payment system * Jun. 2007, Volume 1, No.1 (Monthly) Computer Technology and Application, ISSN1934-7332, USA A secure mobile payment system * LI Xi, HU Han-ping (Institute of Pattern Recognition and Artificial Intelligence,

More information

PayWord and MicroMint: Two Simple MicroPayment Schemes

PayWord and MicroMint: Two Simple MicroPayment Schemes PayWord and MicroMint: Two Simple MicroPayment Schemes Ronald L. Rivest (MIT) Adi Shamir (Weizmann) Outline Micropayments: Framework and Motivation PayWord: : a credit-based scheme using chains of hash

More information

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005 Payment Systems for E-Commerce Shengyu Jin 4/27/2005 Reference Papers 1. Research on electronic payment model,2004 2. An analysis and comparison of different types of electronic payment systems 2001 3.

More information

Certificate Management in Ad Hoc Networks

Certificate Management in Ad Hoc Networks Certificate Management in Ad Hoc Networks Matei Ciobanu Morogan, Sead Muftic Department of Computer Science, Royal Institute of Technology [matei, sead] @ dsv.su.se Abstract Various types of certificates

More information

Security in Electronic Payment Systems

Security in Electronic Payment Systems Security in Electronic Payment Systems Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler Institute for Theoretical Computer Science, ETH Zurich, CH-8092 Zurich e-mail: {camenisch, stadler}@inf.ethz.ch

More information

Comparing and contrasting micro-payment models for E-commerce systems

Comparing and contrasting micro-payment models for E-commerce systems Comparing and contrasting micro-payment models for E-commerce systems Xiaoling Dai 1, John Grundy 1 and Bruce W N Lo 2 1 Department of Computer Science University of Auckland Private Bag 92019, Auckland,

More information

How To Pay With Cash Or Credit Card (For Women)

How To Pay With Cash Or Credit Card (For Women) Electronic Payment Systems Speaker: Jerry Gao Ph.D. San Jose State University email: jerrygao@email.sjsu.edu URL: http://www.engr.sjsu.edu/gaojerry Sept, 2000 Topic: Online Payment Protocols and Systems

More information

A Multi-party Optimistic Non-repudiation Protocol

A Multi-party Optimistic Non-repudiation Protocol A Multi-party Optimistic Non-repudiation Protocol Olivier Markowitch and Steve Kremer {omarkow, skremer}@ulb.ac.be Université Libre de Bruxelles Computer Science Department Bd du Triomphe C.P. 212 1050

More information

Data Deduplication Scheme for Cloud Storage

Data Deduplication Scheme for Cloud Storage 26 Data Deduplication Scheme for Cloud Storage 1 Iuon-Chang Lin and 2 Po-Ching Chien Abstract Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we

More information

Signature Amortization Technique for Authenticating Delay Sensitive Stream

Signature Amortization Technique for Authenticating Delay Sensitive Stream Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,

More information

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,

More information

Cryptanalysis and security enhancement on the generation of Mu-Varadharajan electronic voting protocol. Vahid Jahandideh and Amir S.

Cryptanalysis and security enhancement on the generation of Mu-Varadharajan electronic voting protocol. Vahid Jahandideh and Amir S. 72 Int. J. Electronic Governance, Vol. 3, No. 1, 2010 Cryptanalysis and security enhancement on the generation of Mu-Varadharajan electronic voting protocol Vahid Jahandideh and Amir S. Mortazavi Department

More information

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

NON-REPUDIATION WITH MANDATORY PROOF OF RECEIPT

NON-REPUDIATION WITH MANDATORY PROOF OF RECEIPT NON-REPUDIATION WITH MANDATORY PROOF OF RECEIPT ABSTRACT Tom Coffey and Puneet Saidha University of Limerick Ireland Non-repudiation allows an exchange of data between two principals in such a manner that

More information

Capture Resilient ElGamal Signature Protocols

Capture Resilient ElGamal Signature Protocols Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics acan@fen.bilkent.edu.tr 2 Bilkent University, Department

More information

Authentication Protocols Using Hoover-Kausik s Software Token *

Authentication Protocols Using Hoover-Kausik s Software Token * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 22, 691-699 (2006) Short Paper Authentication Protocols Using Hoover-Kausik s Software Token * WEI-CHI KU AND HUI-LUNG LEE + Department of Computer Science

More information

CSC 774 Advanced Network Security

CSC 774 Advanced Network Security CSC 774 Advanced Network Security 1. Instructor: Dr. Peng Ning, Office: 3258 EB II, Centennial Campus Phone: (919) 513-4457 Email: pning@ncsu.edu URL: http://www.csc.ncsu.edu/faculty/ning Office hours:

More information

Three Kinds of E-wallets for a NetPay Micro-payment System

Three Kinds of E-wallets for a NetPay Micro-payment System Three Kinds of E-wallets for a NetPay Micro-payment System Xiaoling Dai 1 and John Grundy 2, 3 Department of Mathematics and Computing Science The University of the South Pacific, Laucala Campus, Suva,

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

An Anonymous Endorsement System

An Anonymous Endorsement System JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, 107-114 (2002) Short Paper An Anonymous Endorsement System Department of Electrical Engineering National Taiwan University Taipei, 106 Taiwan E-mail:

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

Extending E-Ticketing Service with Mobile Transactions

Extending E-Ticketing Service with Mobile Transactions 1 Extending E-ing Service with Mobile Transactions Shirley Siu, Zhen Sheng Guo, Simon Fong and Sofia Zhuang Abstract The emerging technology in mobile devices presents new business potential to Internet

More information

m Commerce Working Group

m Commerce Working Group m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC

A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC International Journal of Network Security, Vol.18, No.2, PP.217-223, Mar. 2016 217 A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC Dianli Guo and Fengtong

More information

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed 1, D. Rajya Lakshmi 2 and Sayed Abdul Sattar 3 1 Department of Computer Science and

More information

Application of Electronic Ticket to Online Trading With Smart Card Technology Abstract 1. Introduction

Application of Electronic Ticket to Online Trading With Smart Card Technology Abstract 1. Introduction Application of Electronic Ticket to Online Trading With Smart Card Technology Shirley Siu Weng In Guo Zhen Sheng fstwis@umac.mo fstzsg@umac.mo Faculty of Science and Technology University of Macau Abstract

More information

Analysis of E-Commerce Security Protocols SSL and SET

Analysis of E-Commerce Security Protocols SSL and SET Analysis of E-Commerce Security Protocols SSL and SET Neetu Kawatra, Vijay Kumar Dept. of Computer Science Guru Nanak Khalsa College Karnal India ABSTRACT Today is the era of information technology. E-commerce

More information

An Exchange Protocol for Alternative Currencies

An Exchange Protocol for Alternative Currencies An Exchange Protocol for Alternative Currencies Yiyao Hao, Daniel M. Havey and David A. Turner Department of Computer Science California State University, San Bernardino San Bernardino, CA 92407 (hyy92507@yahoo.com,

More information

Chapter 10. e-payments

Chapter 10. e-payments Chapter 10 e-payments AIS 360Prentice Hall, 2003 1 Learning Objectives Understand the crucial factors determining the success of e-payment methods Describe the key elements in securing an e-payment Discuss

More information

A New Receipt-Free E-Voting Scheme Based on Blind Signature (Abstract)

A New Receipt-Free E-Voting Scheme Based on Blind Signature (Abstract) A New Receipt-Free E-Voting Scheme Based on Blind Signature (Abstract) Zhe Xia University of Surrey z.xia@surrey.ac.uk Steve Schneider University of Surrey s.schneider@surrey.ac.uk May 25, 2006 Abstract

More information

Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing

Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing December 2013, 20(6): 88 95 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://jcupt.xsw.bupt.cn Secure and privacy-preserving DRM scheme

More information

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Improvement of digital signature with message recovery using self-certified public keys and its variants

Improvement of digital signature with message recovery using self-certified public keys and its variants Applied Mathematics and Computation 159 (2004) 391 399 www.elsevier.com/locate/amc Improvement of digital signature with message recovery using self-certified public keys and its variants Zuhua Shao Department

More information

Efficient construction of vote-tags to allow open objection to the tally in electronic elections

Efficient construction of vote-tags to allow open objection to the tally in electronic elections Information Processing Letters 75 (2000) 211 215 Efficient construction of vote-tags to allow open objection to the tally in electronic elections Andreu Riera a,,joseprifà b, Joan Borrell b a isoco, Intelligent

More information

Figure 1: Application scheme of public key mechanisms. (a) pure RSA approach; (b) pure EC approach; (c) RSA on the infrastructure

Figure 1: Application scheme of public key mechanisms. (a) pure RSA approach; (b) pure EC approach; (c) RSA on the infrastructure A Low Power Security Architecture for Mobile Commerce Peter Langendoerfer +, Zoya Dyka +, Oliver Maye + and Rolf Kraemer + Abstract: Mobile devices have limited resources in terms of computational power

More information

A Proposal for Authenticated Key Recovery System 1

A Proposal for Authenticated Key Recovery System 1 A Proposal for Authenticated Key Recovery System 1 Tsuyoshi Nishioka a, Kanta Matsuura a, Yuliang Zheng b,c, and Hideki Imai b a Information & Communication Business Div. ADVANCE Co., Ltd. 5-7 Nihombashi

More information

Electronic Commerce and E-wallet

Electronic Commerce and E-wallet International Journal of Recent Research and Review, Vol. I, March 2012 Electronic Commerce and E-wallet Abhay Upadhayaya Department of ABST,University of Rajasthan,Jaipur, India Email: abhayu@rediffmail.com

More information

Information Security

Information Security Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 vedatcoskun@isikun.edu.tr www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked

More information

Uniticket: A Third Party Universal E-Ticket System Based on Mobile Phone *

Uniticket: A Third Party Universal E-Ticket System Based on Mobile Phone * Wireless Engineering and Technology, 2011, 2, 157-164 doi:10.4236/wet.2011.23023 Published Online July 2011 (http://www.scirp.org/journal/wet) 157 Uniticket: A Third Party Universal E-Ticket System Based

More information

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer

More information

On the Limits of Anonymous Password Authentication

On the Limits of Anonymous Password Authentication On the Limits of Anonymous Password Authentication Yan-Jiang Yang a Jian Weng b Feng Bao a a Institute for Infocomm Research, Singapore, Email: {yyang,baofeng}@i2r.a-star.edu.sg. b School of Computer Science,

More information

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden

More information

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

Secure Authentication of Distributed Networks by Single Sign-On Mechanism Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,

More information

A SMART CARD-BASED MOBILE SECURE TRANSACTION SYSTEM FOR MEDICAL TREATMENT EXAMINATION REPORTS. Received January 2010; revised May 2010

A SMART CARD-BASED MOBILE SECURE TRANSACTION SYSTEM FOR MEDICAL TREATMENT EXAMINATION REPORTS. Received January 2010; revised May 2010 International Journal of Innovative Computing, Information and Control ICIC International c 2011 ISSN 1349-4198 Volume 7, Number 5(A), May 2011 pp. 2257 2267 A SMART CARD-BASED MOBILE SECURE TRANSACTION

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and

More information

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Enabling Public Auditing for Secured Data Storage in Cloud Computing IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Design and Implementation of an Inline Certified E-mail Service

Design and Implementation of an Inline Certified E-mail Service Design and Implementation of an Inline Certified E-mail Service Stelvio Cimato 1, Clemente Galdi 2, Raffaella Giordano 3, Barbara Masucci 2, and Ermenegildo Tomasco 1 Dipartimento di Tecnologie dell Informazione

More information

A Study on Secure Electronic Medical DB System in Hospital Environment

A Study on Secure Electronic Medical DB System in Hospital Environment A Study on Secure Electronic Medical DB System in Hospital Environment Yvette E. Gelogo 1 and Sungwon Park 2 * 1 Catholic University of Daegu, Daegu, Korea 2 Department of Nursing, Hannam University, 133

More information

A Secure RFID Ticket System For Public Transport

A Secure RFID Ticket System For Public Transport A Secure RFID Ticket System For Public Transport Kun Peng and Feng Bao Institute for Infocomm Research, Singapore Abstract. A secure RFID ticket system for public transport is proposed in this paper. It

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,

More information

A Road Map on Security Deliverables for Mobile Cloud Application

A Road Map on Security Deliverables for Mobile Cloud Application A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,

More information

An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography

An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography

More information

Electronic Cash Payment Protocols and Systems

Electronic Cash Payment Protocols and Systems Electronic Cash Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University email: jerrygao@email.sjsu.edu URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Presentation Outline - Overview

More information

Controller of Certification Authorities of Mauritius

Controller of Certification Authorities of Mauritius Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)

More information

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES IMPORTANCE AND IMPLEMENTATION OF DIGITAL SIGNATURE IN OFFICE DOCUMENTS Nikita Patel 1, Rakesh Patel 2, Ankita Gupta 3 Student,B.E.(IT) Kirodimal Institute

More information

A Digital Signature Scheme in Web-based Negotiation Support System

A Digital Signature Scheme in Web-based Negotiation Support System A Digital Signature Scheme in Web-based Negotiation Support System Yuxuan Meng 1 and Bo Meng 2 1 Department of Computer Science, University of Saskatchewan, Saskatoon, Saskatchewan, S7N 5C9, Canada yxmeng68@yahoo.ca

More information

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University

More information

ETSI TR 102 071 V1.2.1 (2002-10)

ETSI TR 102 071 V1.2.1 (2002-10) TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,

More information

Comments on "public integrity auditing for dynamic data sharing with multi-user modification"

Comments on public integrity auditing for dynamic data sharing with multi-user modification University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Internet Usage (as of November 1, 2011)

Internet Usage (as of November 1, 2011) ebusiness Chapter 11 Online Payment Systems Internet Usage (as of November 1, 2011) United States Population: 312,521,655 Internet users: 245,000,000 (78.4% of population) Facebook users: 151,350,260 (61.8%

More information

Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory

Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution

More information

Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics

Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics Younsung Choi College of Information and Communication Engineering, Sungkyunkwan University,

More information

PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies

PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies Giannakis Antoniou 1, Campbell Wilson 1, and Dimitris Geneiatakis 2 1 Faculty of Information Technology, Monash University,

More information

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,

More information

A Certified E-Mail Protocol

A Certified E-Mail Protocol A Certified E-Mail Protocol Bruce Schneier Counterpane Systems schneier@counterpane.com James Riordan IBM Zurich Research Laboratory rij@zurich.ibm.com Abstract Protocols to facilitate secure electronic

More information

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal

More information

Building an Anonymous Public Storage Utility Wesley Leggette Cleversafe

Building an Anonymous Public Storage Utility Wesley Leggette Cleversafe Building an Anonymous Public Storage Utility Wesley Leggette Cleversafe Utility Storage r Many different target audiences r Business r Content distribution r Off-site backup r Archival r Consumer r Content

More information

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:

More information

Efficient Nonce-based Authentication Scheme for. session initiation protocol

Efficient Nonce-based Authentication Scheme for. session initiation protocol International Journal of Network Security, Vol.9, No.1, PP.12 16, July 2009 12 Efficient Nonce-based Authentication for Session Initiation Protocol Jia Lun Tsai Degree Program for E-learning, Department

More information

HASH CODE BASED SECURITY IN CLOUD COMPUTING

HASH CODE BASED SECURITY IN CLOUD COMPUTING ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security

More information

Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol

Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol Formal Analysis of A Novel Mutual Authentication and ey Agreement Protocol Ja'afer M. AL-Saraireh Applied Science University Amman 11961, Jordan Saleh S. Saraireh Philadelphia University Amman 11961, Jordan

More information

FAIRNESS IN CERTIFIED ELECTRONIC MAIL

FAIRNESS IN CERTIFIED ELECTRONIC MAIL FAIRNESS IN CERTIFIED ELECTRONIC MAIL Olivier Cailloux Département d Informatique Université Libre de Bruxelles Brussels, Belgium email: olivier.cailloux@ulb.ac.be Nicolás González-Deleito Département

More information

Journal of Electronic Banking Systems

Journal of Electronic Banking Systems Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative

More information

A Secure Electronic Payment Scheme for Charity Donations

A Secure Electronic Payment Scheme for Charity Donations A Secure Electronic Payment Scheme for Charity Donations Mansour A. Al-Meaither and Chris J. Mitchell Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom

More information

A Survey on Untransferable Anonymous Credentials

A Survey on Untransferable Anonymous Credentials A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches

More information

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

Security and privacy rights management for mobile and ubiquitous computing

Security and privacy rights management for mobile and ubiquitous computing Security and privacy rights management for mobile and ubiquitous computing Michael Fahrmair, Wassiou Sitou, and Bernd Spanfelner Technische Universität München, Department of Informatics, Boltzmannstr.3,

More information

Safeguard Intranet Using Embedded and Distributed Firewall System

Safeguard Intranet Using Embedded and Distributed Firewall System Safeguard Intranet Using Embedded and Distributed Firewall System Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-Chun Chou, and Tsung-Che Yang Department of Computer Science and Information Engineering,

More information

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status 10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary

More information