PayWord and MicroMint: Two Simple MicroPayment Schemes



Similar documents
Electronic Payment Systems

Comparing and contrasting micro-payment models for E-commerce systems

Electronic payment systems

4 Electronic Payment Systems

7 Electronic Payment Systems

Peppercoin Micropayments

Comparing and Contrasting Micro-payment Models for Content Sharing in P2P Networks

Cryptography: Authentication, Blind Signatures, and Digital Cash

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Application of Electronic Currency on the Online Payment System like PayPal

Electronic Cash Payment Protocols and Systems

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

Security in Electronic Payment Systems

Electronic Payment Systems on Open Computer Networks: A Survey

Introduction to Cryptography CS 355

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Electronic Payments. EITN40 - Advanced Web Security

How To Pay With Cash Or Credit Card (For Women)


1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

Distributed Public Key Infrastructure via the Blockchain. Sean Pearl April 28, 2015

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Application of Digital Signature for Securing Communication Using RSA Scheme based on MD5

Overview of Public-Key Cryptography

Introduction to Computer Security

Towards a Generalized Payment Model for Internet Services

Architecture for a Component-based, Plug-in Micropayment

PayCash: A Secure Efficient Internet Payment System

Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?

1 Signatures vs. MACs

Efficient construction of vote-tags to allow open objection to the tally in electronic elections

Digital Signatures. What are Signature Schemes?

Improved Online/Offline Signature Schemes

NetBill: An Internet Commerce System Optimized for Network Delivered Services

SECURITY IN NETWORKS

Authenticity of Public Keys

Digital Signatures. Meka N.L.Sneha. Indiana State University. October 2015

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Third Edition. Copyright 2007 Pearson Education, Inc.

Payment systems. Tuomas Aura T Information security technology

Authentication, digital signatures, PRNG

Software Tool for Implementing RSA Algorithm

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

EVALUATION OF MICROPAYMENT TRANSACTION COSTS

The Mathematics of the RSA Public-Key Cryptosystem

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

CS 758: Cryptography / Network Security

Lecture VII : Public Key Infrastructure (PKI)

Payment systems. Tuomas Aura T Information security technology. Aalto University, autumn 2012

TABLE OF CONTENTS INTRODUCTORY THE FOUNDATION OF E & M. 4. E-Commerce & M-Commerce Technologies. (c) Internet Based Research Approaches.

CRYPTOGRAPHY IN NETWORK SECURITY

SURVEY OF ELECTRONIC PAYMENT METHODS AND SYSTEMS

Signature Schemes. CSG 252 Fall Riccardo Pucella

NIST Test Personal Identity Verification (PIV) Cards

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

7! Cryptographic Techniques! A Brief Introduction

An electronic cash scheme and its management

E-commerce Project Management

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

An Introduction to Cryptography and Digital Signatures

Lecture 15 - Digital Signatures

Electronic Payment Systems

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Digital Signatures. Prof. Zeph Grunschlag

Chapter - 7. Electronic Payment Systems

An Analysis of the Bitcoin Electronic Cash System

DIGITAL SIGNATURES 1/1

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Authentication requirement Authentication function MAC Hash function Security of

Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University

An Internet Based Anonymous Electronic Cash System

SSL. Secure Sockets Layer. - a short summary - By Christoph Gutmann and Khôi Tran

The Definition of Electronic Payment

Computer Science A Cryptography and Data Security. Claude Crépeau

ELECTRONIC COMMERCE WORKED EXAMPLES

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015

An Exchange Protocol for Alternative Currencies

Transcription:

PayWord and MicroMint: Two Simple MicroPayment Schemes Ronald L. Rivest (MIT) Adi Shamir (Weizmann)

Outline Micropayments: Framework and Motivation PayWord: : a credit-based scheme using chains of hash values (or paywords): w w 0 1 w 2 w 3... MicroMint: : digital coins as k-way hash function collisions: x 1 x 2 x 3 x 4 y Conclusions

Micropayments Payment scheme for low-value transactions, such as 1 per web page access Too small for credit-card macropayments (which may incur fee of 29 + 2%) Public-key crypto relatively expensive: RSA sign (private key) 2 / sec RSA verify (public key) 200 / sec Hash function 20000 / sec

Micropayments Some advanced features, such as anonymity, are probably just too expensive to implement in a micropayment scheme. With light-weight schemes, one must be pragmatic about fraud and abuse: the goal should be effective risk management,, rather than total prevention. Bad apples can be detected and eliminated from the system.

Introduce Broker to intermediate and aggregate: Micropayments 1. Obtain authorization or coins Broker Banks and Credit-card companies 3. Redeem payments User (Inner loop) Vendor 2. Purchase information from vendor; pay.

Efficiency Goals Try to minimize use of public-key operations. Try to keep Broker off-line as much as possible. Make inner loop (purchase/payment) efficient, especially for repeated small purchases.

PayWord

PayWord Chains h h h h h w w 0 1 w 2 w 3... w n Easy for User to create a chain of length, say, n = 1000 for a vendor using h = MD5, by starting with w n. User commits (signs with RSA) root w 0 over to Vendor. User makes successive 1 payments by revealing paywords w 1, w 2,... in turn. Vendor redeems commitment, and last payword received, with Broker.

PayWord Certificate Broker gives User a signed certificate C U good for one month authorizing User to make PayWord chains. Broker is extending credit to User. C U = {Broker, User, User s IP Address, PK U, expiration-date, limits, etc.} SKB where PK U = User s Public RSA Key. Certificate authorizes delivery of goods only to specified Internet address.

PayWord Commitment User commits root w 0 to Vendor by signing a commitment message M UV : M UV = {User, Vendor, w 0, C U, expiration-date } SKU Commitment contains User s certificate C. U User commits to PayWord chain for, say, one day. Note that Broker is not directly involved.

PayWord Basic PayWord information flow. Note that Broker is off-line except for issuing monthly certificate and final redemption. Broker (1) Certificate C U (3) M UV, w 20 User (2) Goods Vendor (2) Commitment M UV, w 1 (first payment) w 2 (second payment)... w 20 (20th payment)

PayWord Costs One signature by Broker / user / month (C( U ) One signature by User / vendor / day (M( UV ) Two verifications by Vendor / user / day (C U and M UV ) One verification by Broker / user / vendor /day (for M UV ) One hash function computation by each of User, Vendor, and Broker for each 1 payment.

PayWord Extensions Can pay for a 5 item by revealing w 10 after w 5 (like revealing five paywords at once). Can have several payword chains per commitment, with different values per payword in each chain: e.g. a chain of 1 paywords, a chain of 25 paywords, and a chain of 1$ paywords.

MicroMint

A digital coin should be: Hard to produce [except by Broker] Easy to verify [by anyone] MicroMint Digital signatures work, but are relatively expensive. MicroMint uses hash functions only (no public- key crypto). Broker utilizes economy of scale to produce MicroMint coins cheaply (as with a regular mint).

MicroMint Coins Suppose hash function h : {0,1} 48 {0,1} 36 maps m = 48-bit strings to n = 36-bit strings. A k-way collision is a k-tuple (x 1,x 2,...,x k ) of values such that h(x 1 ) = h(x 2 ) =... = h(x k ): x 1 x 2 x 3 x 4 h h h h y A MicroMint coin is a k-way collision (k=4). Verifying a coin is easy.

Producing coins is like tossing balls into 2 n bins; k balls in a bin makes one coin. Minting Coins Producing first 2-way collision requires time 2 n/2 ; this is the birthday paradox. Producing first k-way collision requires time N k = 2 n(k-1)/k. (e.g. 2 27 for k=4, n = 36.) (It s hard to forge even one coin.) Time cn k yields c k coins; once threshold of N k is passed, coins are produced rapidly. (Mint has economy of scale).

Flow of MicroMint Coins Broker mints coins and sells them to User. User spends coins with Vendor. Vendor deposits coins back to Broker. Broker 1. Purchase coins 3. Redeem coins User Vendor 2. Pay for goods

Security Concerns Forgery: : Can an adversary forge MicroMint coins? (Economically?) Double-spending: : What if a user double- spends his MicroMint coins? Vendor fraud: : What if a vendor gives copies of coins received to an accomplice? Framing: : Can vendor frame user for double- spending, or user frame vendor for fraud?

Protections against forgery Computational difficulty of minting coins. Small-scale forgery not really a concern; large- scale forgers will get caught. Coins expire monthly. New hash function revealed each month, and old coins exchanged for newly minted ones. (Broker works during May to make coins good for June; forger only learns h June at beginning of June, and so starts out way behind.)

Protection against double-spending There is no anonymity in MicroMint: the Broker keeps track of whom each coin was sold to, and notes when it is returned by vendor. Small-scale double-spending not a concern. A user whose coins are consistently double- spent (with many vendors) will be caught and black-listed; he will not be sold any more MicroMint coins.

Protection against vendor fraud Vendors who consistently redeem coins that are also redeemed by other vendors will be black- listed and refused further redemption service by the Broker. Users can cooperate with Broker to identify bad vendors by identifying where coin was first spent.

Protection against framing It may be difficult for Broker to distinguish user double-spending from vendor fraud. Small-scale double-spending or fraud not a concern. Large-scale cheaters should be distinguishable by weight of evidence against them.

Additional protection against forgery Coins may satisfy hidden predicates which are only announced if forgery is detected by Broker. For example, legitimate coins may all satisfy condition that low-order bit of x i is equal to some complicated function of other bits. Forger s coins will typically not pass this additional verification condition. Broker can announce several such conditions (or even one each day of month).

Related Micropayment Schemes Millicent (Manasse et al. / DEC) Scrip for each vendor, broker on-line. NetBill (Tygar / CMU) Heavy use of public-key crypto. NetCard (Anderson / Cambridge) Similar to PayWord, but bank signs commitments. CAFE (Pederson and IBM Zurich) Similar to PayWord, but not credit-based.

Conclusions We have presented two new micropayment schemes, PayWord and MicroMint,, that minimize or eliminate public-key operations. PayWord/ MicroMint paper available from: http://theory.lcs.mit.edu/~rivest