PayWord and MicroMint: Two Simple MicroPayment Schemes
|
|
|
- Marian Howard
- 10 years ago
- Views:
Transcription
1 PayWord and MicroMint: Two Simple MicroPayment Schemes Ronald L. Rivest (MIT) Adi Shamir (Weizmann)
2 Outline Micropayments: Framework and Motivation PayWord: : a credit-based scheme using chains of hash values (or paywords): w w 0 1 w 2 w 3... MicroMint: : digital coins as k-way hash function collisions: x 1 x 2 x 3 x 4 y Conclusions
3 Micropayments Payment scheme for low-value transactions, such as 1 per web page access Too small for credit-card macropayments (which may incur fee of %) Public-key crypto relatively expensive: RSA sign (private key) 2 / sec RSA verify (public key) 200 / sec Hash function / sec
4 Micropayments Some advanced features, such as anonymity, are probably just too expensive to implement in a micropayment scheme. With light-weight schemes, one must be pragmatic about fraud and abuse: the goal should be effective risk management,, rather than total prevention. Bad apples can be detected and eliminated from the system.
5 Introduce Broker to intermediate and aggregate: Micropayments 1. Obtain authorization or coins Broker Banks and Credit-card companies 3. Redeem payments User (Inner loop) Vendor 2. Purchase information from vendor; pay.
6 Efficiency Goals Try to minimize use of public-key operations. Try to keep Broker off-line as much as possible. Make inner loop (purchase/payment) efficient, especially for repeated small purchases.
7 PayWord
8 PayWord Chains h h h h h w w 0 1 w 2 w 3... w n Easy for User to create a chain of length, say, n = 1000 for a vendor using h = MD5, by starting with w n. User commits (signs with RSA) root w 0 over to Vendor. User makes successive 1 payments by revealing paywords w 1, w 2,... in turn. Vendor redeems commitment, and last payword received, with Broker.
9 PayWord Certificate Broker gives User a signed certificate C U good for one month authorizing User to make PayWord chains. Broker is extending credit to User. C U = {Broker, User, User s IP Address, PK U, expiration-date, limits, etc.} SKB where PK U = User s Public RSA Key. Certificate authorizes delivery of goods only to specified Internet address.
10 PayWord Commitment User commits root w 0 to Vendor by signing a commitment message M UV : M UV = {User, Vendor, w 0, C U, expiration-date } SKU Commitment contains User s certificate C. U User commits to PayWord chain for, say, one day. Note that Broker is not directly involved.
11 PayWord Basic PayWord information flow. Note that Broker is off-line except for issuing monthly certificate and final redemption. Broker (1) Certificate C U (3) M UV, w 20 User (2) Goods Vendor (2) Commitment M UV, w 1 (first payment) w 2 (second payment)... w 20 (20th payment)
12 PayWord Costs One signature by Broker / user / month (C( U ) One signature by User / vendor / day (M( UV ) Two verifications by Vendor / user / day (C U and M UV ) One verification by Broker / user / vendor /day (for M UV ) One hash function computation by each of User, Vendor, and Broker for each 1 payment.
13 PayWord Extensions Can pay for a 5 item by revealing w 10 after w 5 (like revealing five paywords at once). Can have several payword chains per commitment, with different values per payword in each chain: e.g. a chain of 1 paywords, a chain of 25 paywords, and a chain of 1$ paywords.
14 MicroMint
15 A digital coin should be: Hard to produce [except by Broker] Easy to verify [by anyone] MicroMint Digital signatures work, but are relatively expensive. MicroMint uses hash functions only (no public- key crypto). Broker utilizes economy of scale to produce MicroMint coins cheaply (as with a regular mint).
16 MicroMint Coins Suppose hash function h : {0,1} 48 {0,1} 36 maps m = 48-bit strings to n = 36-bit strings. A k-way collision is a k-tuple (x 1,x 2,...,x k ) of values such that h(x 1 ) = h(x 2 ) =... = h(x k ): x 1 x 2 x 3 x 4 h h h h y A MicroMint coin is a k-way collision (k=4). Verifying a coin is easy.
17 Producing coins is like tossing balls into 2 n bins; k balls in a bin makes one coin. Minting Coins Producing first 2-way collision requires time 2 n/2 ; this is the birthday paradox. Producing first k-way collision requires time N k = 2 n(k-1)/k. (e.g for k=4, n = 36.) (It s hard to forge even one coin.) Time cn k yields c k coins; once threshold of N k is passed, coins are produced rapidly. (Mint has economy of scale).
18 Flow of MicroMint Coins Broker mints coins and sells them to User. User spends coins with Vendor. Vendor deposits coins back to Broker. Broker 1. Purchase coins 3. Redeem coins User Vendor 2. Pay for goods
19 Security Concerns Forgery: : Can an adversary forge MicroMint coins? (Economically?) Double-spending: : What if a user double- spends his MicroMint coins? Vendor fraud: : What if a vendor gives copies of coins received to an accomplice? Framing: : Can vendor frame user for double- spending, or user frame vendor for fraud?
20 Protections against forgery Computational difficulty of minting coins. Small-scale forgery not really a concern; large- scale forgers will get caught. Coins expire monthly. New hash function revealed each month, and old coins exchanged for newly minted ones. (Broker works during May to make coins good for June; forger only learns h June at beginning of June, and so starts out way behind.)
21 Protection against double-spending There is no anonymity in MicroMint: the Broker keeps track of whom each coin was sold to, and notes when it is returned by vendor. Small-scale double-spending not a concern. A user whose coins are consistently double- spent (with many vendors) will be caught and black-listed; he will not be sold any more MicroMint coins.
22 Protection against vendor fraud Vendors who consistently redeem coins that are also redeemed by other vendors will be black- listed and refused further redemption service by the Broker. Users can cooperate with Broker to identify bad vendors by identifying where coin was first spent.
23 Protection against framing It may be difficult for Broker to distinguish user double-spending from vendor fraud. Small-scale double-spending or fraud not a concern. Large-scale cheaters should be distinguishable by weight of evidence against them.
24 Additional protection against forgery Coins may satisfy hidden predicates which are only announced if forgery is detected by Broker. For example, legitimate coins may all satisfy condition that low-order bit of x i is equal to some complicated function of other bits. Forger s coins will typically not pass this additional verification condition. Broker can announce several such conditions (or even one each day of month).
25 Related Micropayment Schemes Millicent (Manasse et al. / DEC) Scrip for each vendor, broker on-line. NetBill (Tygar / CMU) Heavy use of public-key crypto. NetCard (Anderson / Cambridge) Similar to PayWord, but bank signs commitments. CAFE (Pederson and IBM Zurich) Similar to PayWord, but not credit-based.
26 Conclusions We have presented two new micropayment schemes, PayWord and MicroMint,, that minimize or eliminate public-key operations. PayWord/ MicroMint paper available from:
Electronic Payment Systems
Foundations of Secure e-commerce (bmevihim219) Dr. Levente Buttyán Associate Professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) [email protected],
Comparing and contrasting micro-payment models for E-commerce systems
Comparing and contrasting micro-payment models for E-commerce systems Xiaoling Dai 1, John Grundy 1 and Bruce W N Lo 2 1 Department of Computer Science University of Auckland Private Bag 92019, Auckland,
Electronic payment systems
Electronic payment systems overview of basic concepts credit-card based systems (MOTO, SSL, SET) electronic cash systems (DigiCash) micropayment schemes (PayWord, probabilistic schemes) brief history of
4 Electronic Payment Systems
4 Electronic Payment Systems 4.1 Traditional Payment Systems 4.2 Credit-Card Based Payment Standards 4.3 Electronic Cash and Micropayments 4.4 Practice of E-Payment Literature: Donal O Mahony, Michael
7 Electronic Payment Systems
7 Electronic Payment Systems 7.1 Traditional Payment Systems 7.2 Credit-Card Based Payment Standards 7.3 Electronic Cash and Micropayments 7.4 Practice of E- and M-Payment Literature: Donal O!Mahony, Michael
Peppercoin Micropayments
Peppercoin Micropayments Ronald L. Rivest MIT CSAIL (joint work with Prof. Silvio Micali) Outline Micropayment examples Challenges Aggregation methods The Peppercoin method (In England a peppercorn is
Comparing and Contrasting Micro-payment Models for Content Sharing in P2P Networks
Comparing and Contrasting Micro-payment Models for Content Sharing in P2P Networks Xiaoling Dai 1, Kaylash Chaudhary 2 and John Grundy 3 School of Computing Information and Mathematics Science The University
Cryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Application of Electronic Currency on the Online Payment System like PayPal
Application of Electronic Currency on the Online Payment System like PayPal Rafael Martínez Peláez, Francisco J. Rico Novella Technical University of Catalonia (UPC), Department of Telematics Engineering
Electronic Cash Payment Protocols and Systems
Electronic Cash Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University email: [email protected] URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Presentation Outline - Overview
Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem
Digital Signatures Murat Kantarcioglu Based on Prof. Li s Slides Digital Signatures: The Problem Consider the real-life example where a person pays by credit card and signs a bill; the seller verifies
Security in Electronic Payment Systems
Security in Electronic Payment Systems Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler Institute for Theoretical Computer Science, ETH Zurich, CH-8092 Zurich e-mail: {camenisch, stadler}@inf.ethz.ch
Electronic Payment Systems on Open Computer Networks: A Survey
Electronic Payment Systems on Open Computer Networks: A Survey Working paper Thomi Pilioura Abstract The extraordinary growth of international interconnected computer networks and the pervasive trend of
Introduction to Cryptography CS 355
Introduction to Cryptography CS 355 Lecture 30 Digital Signatures CS 355 Fall 2005 / Lecture 30 1 Announcements Wednesday s lecture cancelled Friday will be guest lecture by Prof. Cristina Nita- Rotaru
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
Electronic Payments. EITN40 - Advanced Web Security
Electronic Payments EITN40 - Advanced Web Security 1 Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin
How To Pay With Cash Or Credit Card (For Women)
Electronic Payment Systems Speaker: Jerry Gao Ph.D. San Jose State University email: [email protected] URL: http://www.engr.sjsu.edu/gaojerry Sept, 2000 Topic: Online Payment Protocols and Systems
Group Blind Digital Signatures: Theory and Applications by Zulækar Amin Ramzan Submitted to the Department of Electrical Engineering and Computer Science in partial fulællment of the requirements for the
1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.
1 Digital Signatures A digital signature is a fundamental cryptographic primitive, technologically equivalent to a handwritten signature. In many applications, digital signatures are used as building blocks
Distributed Public Key Infrastructure via the Blockchain. Sean Pearl [email protected] April 28, 2015
Distributed Public Key Infrastructure via the Blockchain Sean Pearl [email protected] April 28, 2015 Overview Motivation: Electronic Money Example TTP: PayPal Bitcoin (BTC) Background Structure Other
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Application of Digital Signature for Securing Communication Using RSA Scheme based on MD5
Application of Digital Signature for Securing Communication Using RSA Scheme based on MD5 Fashoto S.G, Gbadeyan J.A and Okeyinka E.A Redeemer s University, Redemption camp Mowe, Ogun State [email protected]
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
Towards a Generalized Payment Model for Internet Services
Towards a Generalized Payment Model for Internet Services Michael Fischer, 1 Harald Gall, 1 and Manfred Hauswirth 2 1 Distributed Systems Group Technical University of Vienna, A-1040 Vienna, Austria {fischer,gall}@infosys.tuwien.ac.at
Architecture for a Component-based, Plug-in Micropayment
In Proceedings of 5th Asia-Pacific Web Conference, September 27-29 2003, Xi an, China, Springer LNCS 2642, pp. 251-262. Architecture for a Component-based, Plug-in Micropayment System Xiaoling Dai 1 and
PayCash: A Secure Efficient Internet Payment System
PayCash: A Secure Efficient Internet Payment System Jon M. Peha 1 and Ildar M. Khamitov Cyphermint Inc., Marlborough, MA, USA ABSTRACT This paper describes PayCash, an Internet payment system that was
Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?
Cryptography Digital Signatures Professor: Marius Zimand Digital signatures are meant to realize authentication of the sender nonrepudiation (Note that authentication of sender is also achieved by MACs.)
1 Signatures vs. MACs
CS 120/ E-177: Introduction to Cryptography Salil Vadhan and Alon Rosen Nov. 22, 2006 Lecture Notes 17: Digital Signatures Recommended Reading. Katz-Lindell 10 1 Signatures vs. MACs Digital signatures
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
Information Processing Letters 75 (2000) 211 215 Efficient construction of vote-tags to allow open objection to the tally in electronic elections Andreu Riera a,,joseprifà b, Joan Borrell b a isoco, Intelligent
Digital Signatures. What are Signature Schemes?
Digital Signatures Debdeep Mukhopadhyay IIT Kharagpur What are Signature Schemes? Provides message integrity in the public key setting Counter-parts of the message authentication schemes in the public
Improved Online/Offline Signature Schemes
Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion
NetBill: An Internet Commerce System Optimized for Network Delivered Services
In Proceedings of the 40th IEEE Computer Society International Conference, Spring 1995, pp. 20-25 NetBill: An Internet Commerce System Optimized for Network Delivered Services Marvin Sirbu J. D. Tygar
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
Digital Signatures. Meka N.L.Sneha. Indiana State University. [email protected]. October 2015
Digital Signatures Meka N.L.Sneha Indiana State University [email protected] October 2015 1 Introduction Digital Signatures are the most trusted way to get documents signed online. A digital
Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.
Lecture 13 Public Key Distribution (certification) 1 PK-based Needham-Schroeder TTP 1. A, B 4. B, A 2. {PKb, B}SKT B}SKs 5. {PK a, A} SKT SKs A 3. [N a, A] PKb 6. [N a, N b ] PKa 7. [N b ] PKb B Here,
E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Third Edition. Copyright 2007 Pearson Education, Inc.
Copyright 2007 Pearson Education, Inc. Slide 6-1 E-commerce business. technology. society. Third Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 6-2 Chapter
Payment systems. Tuomas Aura T-110.4206 Information security technology
Payment systems Tuomas Aura T-110.4206 Information security technology Outline 1. Money transfer 2. Card payments 3. Anonymous payments 2 MONEY TRANSFER 3 Common payment systems Cash Electronic credit
Authentication, digital signatures, PRNG
Multimedia Security Authentication, digital signatures, PRNG Mauro Barni University of Siena Beyond confidentiality Up to now, we have been concerned with protecting message content (i.e. confidentiality)
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
EVALUATION OF MICROPAYMENT TRANSACTION COSTS
EVALUATION OF MICROPAYMENT TRANSACTION COSTS Ioannis Papaefstathiou Institute of Computer Science (ICS) Foundation of Research and Technology Hellas P.O. Box 1385, GR 711 10 Heraklion, Crete, Greece [email protected]
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Lecture VII : Public Key Infrastructure (PKI)
Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public
Payment systems. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2012
Payment systems Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2012 Outline 1. Money transfer 2. Card payments 3. Anonymous payments 2 MONEY TRANSFER 3 Common payment systems
TABLE OF CONTENTS INTRODUCTORY THE FOUNDATION OF E & M. 4. E-Commerce & M-Commerce Technologies. (c) Internet Based Research Approaches.
TABLE OF CONTENTS Chapter 1 INTRODUCTORY THE FOUNDATION OF E & M 1. Conceptual Analysis of E-Commerce. 2. Objective of Study. 3. What is M-Commerce. 4. E-Commerce & M-Commerce Technologies. 5. Scope of
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
SURVEY OF ELECTRONIC PAYMENT METHODS AND SYSTEMS
SURVEY OF ELECTRONIC PAYMENT METHODS AND SYSTEMS Paul J.M. Havinga, Gerard J.M. Smit, Arne Helme University of Twente, department of Computer Science P.O. Box 217, 7500 AE Enschede, the Netherlands e-mail
Signature Schemes. CSG 252 Fall 2006. Riccardo Pucella
Signature Schemes CSG 252 Fall 2006 Riccardo Pucella Signatures Signatures in real life have a number of properties They specify the person responsible for a document E.g. that it has been produced by
NIST Test Personal Identity Verification (PIV) Cards
NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
An electronic cash scheme and its management
An electronic cash scheme and its management Hua Wang (*) Yanchun Zhang (**) Jinli Cao (***) (*)Department of Maths & Computing, University of Southern Queensland Toowoomba QLD 4350 Australia Email: [email protected]
E-commerce Project Management
Economy Informatics, 1-4/2004 95 E-commerce Project Management Professor Ion IVAN PhD., Saha PRIYATOSH, assistant lecturer Cristian TOMA Economy Informatics Department, Academy of Economic Studies Bucharest
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
An Introduction to Cryptography and Digital Signatures
An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through
Lecture 15 - Digital Signatures
Lecture 15 - Digital Signatures Boaz Barak March 29, 2010 Reading KL Book Chapter 12. Review Trapdoor permutations - easy to compute, hard to invert, easy to invert with trapdoor. RSA and Rabin signatures.
Electronic Payment Systems
Electronic Payment Systems In any commercial transaction payment is an integral part for goods supplied. Four types of payments may be made in e-commerce they are Credit card payments Electronic cheque
Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg
Outline CSc 466/566 Computer Security 8 : Cryptography Digital Signatures Version: 2012/02/27 16:07:05 Department of Computer Science University of Arizona [email protected] Copyright c 2012 Christian
Digital Signatures. Prof. Zeph Grunschlag
Digital Signatures Prof. Zeph Grunschlag (Public Key) Digital Signatures PROBLEM: Alice would like to prove to Bob, Carla, David,... that has really sent them a claimed message. E GOAL: Alice signs each
Chapter - 7. Electronic Payment Systems
Chapter - 7 Electronic Payment Systems The Basics Implementation of electronic payment systems is in its infancy and still evolving. The technical, cultural and legal components of electronic payment systems
An Analysis of the Bitcoin Electronic Cash System
An Analysis of the Bitcoin Electronic Cash System Danielle Drainville University of Waterloo December 21, 2012 1 Abstract In a world that relies heavily on technology, privacy is sought by many. Privacy,
DIGITAL SIGNATURES 1/1
DIGITAL SIGNATURES 1/1 Signing by hand COSMO ALICE ALICE Pay Bob $100 Cosmo Alice Alice Bank =? no Don t yes pay Bob 2/1 Signing electronically Bank Internet SIGFILE } {{ } 101 1 ALICE Pay Bob $100 scan
Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1
Chapter 4 Authentication Applications COSC 490 Network Security Annie Lu 1 OUTLINE Kerberos X.509 Authentication Service COSC 490 Network Security Annie Lu 2 Authentication Applications authentication
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University
Implementation and Comparison of Various Digital Signature Algorithms -Nazia Sarang Boise State University What is a Digital Signature? A digital signature is used as a tool to authenticate the information
An Internet Based Anonymous Electronic Cash System
Research Paper American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-4, Issue-4, pp-148-152 www.ajer.org Open Access An Internet Based Anonymous Electronic Cash System
SSL. Secure Sockets Layer. - a short summary - By Christoph Gutmann and Khôi Tran
SSL Secure Sockets Layer - a short summary - By Christoph Gutmann and Khôi Tran Page 1 / 7 Table of contents 1. Brief historic outline of SSL 2. Why did SSL come to life? 3. How does SSL work? 4. Where
The Definition of Electronic Payment
Part IX: epayment Learning Targets What are the electronic means of payment? What is the difference between pico-, micro- and macro-payment? How can we classify the e-payment systems? How can secure transactions
Computer Science 308-547A Cryptography and Data Security. Claude Crépeau
Computer Science 308-547A Cryptography and Data Security Claude Crépeau These notes are, largely, transcriptions by Anton Stiglic of class notes from the former course Cryptography and Data Security (308-647A)
ELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015
Payment systems Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2015 Outline 1. Card payment 2. (Anonymous digital cash) 3. Bitcoin 2 CARD PAYMENT 3 Bank cards Credit or debit card
An Exchange Protocol for Alternative Currencies
An Exchange Protocol for Alternative Currencies Yiyao Hao, Daniel M. Havey and David A. Turner Department of Computer Science California State University, San Bernardino San Bernardino, CA 92407 ([email protected],
