多媒體網路安全實驗室 Private Information Retrieval Scheme Combined with E- Payment in Querying Valuable Information Date:2010.01.02 Reporter: Chien-Wen Huang 出處:

Slides:



Advertisements
Similar presentations
Internet payment systems
Advertisements

多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
多媒體網路安全實驗室 Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Date : Reporter : Hong Ji Wei Authors.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
Digital Cash Present By Kevin, Hiren, Amit, Kai. What is Digital Cash?  A payment message bearing a digital signature which functions as a medium of.
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
Slide 1 Vitaly Shmatikov CS 378 Digital Cash. slide 2 Digital Cash: Properties uDigital “payment message” with properties of cash uUnforgeable Users cannot.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
多媒體網路安全實驗室 Towards Secure and Effective Utilization over Encrypted Cloud Data 報告人 : 葉瑞群 日期 :2012/05/09 出處 :IEEE Transactions on Knowledge and Data Engineering.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
ELECTRONIC PAYMENT SYSTEMS SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
Your Presenter Amer Sharaf Electronic Payments: Where do we go from here? ByMarkus Jakobsson David Mraihi Yiannis Tsiounis Moti Yung.
1 Blind Signatures 盲簽章 Chun-I Fan 范俊逸 E-Commerce & Security Engineering Lab. Department of Computer Science and Engineering National Sun Yat-Sen University.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
1 A practical off-line digital money system with partially blind signatures based on the discrete logarithm problem From: IEICE TRANS. FUNDAMENTALS, VOL.E83-A,No.1.
1 電子商務代理人與無線射頻系統上安全設計之研究 The Study of Secure Schemes on Agent-based Electronic Commerce Transaction and RFID system 指導教授 : 詹進科 教授 (Prof. Jinn-Ke Jan) 陳育毅.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 4 Data Authentication Part II.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
多媒體網路安全實驗室 A Strong User Authentication Framework for Cloud Computing Date : Reporter : Hong Ji Wei Authors : Amlan Jyoti Choudhury, Mangal.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Secure Electronic Transaction (SET)
多媒體網路安全實驗室 A Security Framework of Group Location-Based Mobile Applications in Cloud Computing Date : Reporter : Hong Ji Wei Authors : Yu-Jia.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/05 報告人:向峻霈.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Cryptography, Authentication and Digital Signatures
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
Lecture 8 e-money. Today Secure Electronic Transaction (SET) CyberCash On line payment system using e-money ECash NetCash MilliCent CyberCoin.
Lecture 12 E-Commerce and Digital Cash. As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
Chapter 6:Esoteric Protocols Dulal C Kar. Secure Elections Ideal voting protocol has at least following six properties 1.Only authorized voters can vote.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
How to Make E-cash with Non-Repudiation and Anonymity Ronggong Song, Larry Korba Proceedings of the International Conference on Information.
多媒體網路安全實驗室 Protecting the Privacy of Users in e-Commerce Environment Date: Reporter:Chien-Wen Huang Author: Chun-Hua Chen and Gwoboa Horng 出處:
2/16/001 E-commerce Systems Electronic Payment Systems.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
多媒體網路安全實驗室 Anonymous ID Signature Scheme with Provable Identity Date: Reporter :Chien-Wen Huang 出處: 2008 Second International Conference on Future.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
多媒體網路安全實驗室 Practical Searching Over Encrypted Data By Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: GLOBECOM 2010, 2010 IEEE.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Secure untraceable off-line electronic cash system Sharif University of Technology Scientia Iranica Volume 20, Issue 3, Pp. 637–646, June 2013 Baseri,
BZUPAGES.COM E-cash Payment System A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of.
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 : Xiong Li, Yongping.
TOMIN: Trustworthy Mobile Cash with Expiration-date Attached Author: Rafael Martínez-Peláez and Francisco Rico-Novella. Source: Journal of Software, 2010,
多媒體網路安全實驗室 An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security Date:2012/02/16.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Electronic Banking & Security Electronic Banking & Security.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/12 報告人:向峻霈.
A Practical Voting Scheme Using One Server with a Secure Coprocessor
Reporter:Chien-Wen Huang
A flexible date-attachment scheme on e-cash
Presentation transcript:

多媒體網路安全實驗室 Private Information Retrieval Scheme Combined with E- Payment in Querying Valuable Information Date: Reporter: Chien-Wen Huang 出處: Innovative Computing, Information and Control (ICICIC), 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC), 2009 Fourth International Conference on

多媒體網路安全實驗室 Outline Introduction 1 Electronic Cash Approach 2 The Proposed Scheme 33 The Security Analysis of the Proposed Scheme 44 Conclusions 35 2

多媒體網路安全實驗室 Introduction  Formally, private information retrieval (PIR) was a general problem of private retrieval of the i- item out of an n item database stored at the server.  SC(a temper-proof device):It prevents information from revealing to anyone or administrator of the server and makes every legal user of the server have their own privacy. 3

多媒體網路安全實驗室 Electronic Cash Approach  Untraceable e-CASH payment system presented by Chaum is designed according to RSA public-key system. A.Initializing  the bank announces (e, n) and one-way hash function H(), but regards p, q, d as a secret.  Suppose the electronic cash issued by bank is w dollars.  both the customers and the merchants taking part in e-CASH payment system must have accounts in the bank. 4

多媒體網路安全實驗室 B. Withdrawing  The customer wants to withdraw money w dollars from the bank account.  is delivered to the bank for signing.  the bank will withdraw w dollars from customer’s account,and sign α to get blinded cash t to customer.  After receiving the blinded cash, the customer computes  (c, m) is the available e-CASH. 5

多媒體網路安全實驗室 C.Ordering  Before the customer orders some products or has electronic service from online merchant.  the merchant will first verify customer’s ID and then give a bill to the customer asking for his signature to confirm the transaction.(makes sure the transaction is valid) 6

多媒體網路安全實驗室 D.Paying  When database server charges money to customers, they can pay withdrawn e-CASH (c, m) to the merchant.  After receiving e-CASH from customers, the merchant will verify the validity of e-CASH and execute double-spending checking. 7

多媒體網路安全實驗室 THE PROPOSED SCHEME 8

多媒體網路安全實驗室  Database 1:stores the roster,ID and personal information of all membership.  Database 2 is a special database (patent or pharmaceutical database) and stores their integrated information(Bi) and price.  Database 3: stores encrypted customers’ identification (ID'), e-cash paid by customers, buying information (Bi) and the encrypted buying information (C'). 9

多媒體網路安全實驗室  the following notation is used in the description -PK SC : the public key of SC -SK SC : the secret key of SC -PK C : the public key of the customer -SK C : the secret key of the customer -ID: the customer’s identification -ID': the encrypted customer’s identification(by Hash function) 10

多媒體網路安全實驗室 -M: the secure message of customer’s identification and buying information -M': the secure message of customer’s identification and buying price created by SC. -C: the secure message of payment created by customers -C': customers pay for the encrypted patent B i 11

多媒體網路安全實驗室 -B i : the information of customer’s buying -B: the entire information database -D: the digest of B i -Price: the price of customer’s buying B i -e-Cash: electronic cash based on blind signature 12

多媒體網路安全實驗室  A. Initialization Phase 1.Customers previously skim over the digest and price of buying information database B. 2.The customer produces a pair of keys (PK C,SK C ) and SC produces a pair of keys (PK SC,SK SC ).  B. Authentication and Purchase Phase 1.The customer uses public key 2.The customer delivers encrypted M to SC. 3.SC receives M,and 13

多媒體網路安全實驗室 4.SC verifies the customer’s ID from Database 1, collates the ID of all the membership and temporarily stores the qualified customers’ID. 5.SC computes Hash function operation 6.SC gets the buying information and price from Database 2. The qualified B i and price will temporarily store in SC. 7.SC: to customer. 8.Customer: 14

多媒體網路安全實驗室  C. Payment Phase 1.Customer: uses the public key PK SC of SC to encrypt 2.The customer delivers C to SC 3.The SC receives and decrypts C 4.SC will check its validity and whether it is doublespending to the bank.If the eCASH is no problem,the payment phase is finished. 15

多媒體網路安全實驗室  D. End Phase 1.SC: 2.SC transfers C' to the customer and saves(ID', C', eCASH) of the customer in Database 3. 3.the customer obtains C’ and decrypts it. 4.Then the deal of buying information is over. 16

多媒體網路安全實驗室 THE SECURITY ANALYSIS OF THE PROPOSED SCHEME  A. The Analysis in the Authentication Phase  The information which transfers between SC and the customer is encrypted by the public-key cryptography.  Because the identity authentication process of the customer is processed in SC,it can protect the user privacy in the authentication phase.  SC gets all the ID from Database 1 and compare to the customer’s ID,Because all the ID of the legal customers are caught into SC(no one including the server knows which customer wants to buy information.) 17

多媒體網路安全實驗室  B. The Analysis in the Purchase Phase  SC gets all the information in B and the price to compare with Bi and Price.  Then, keep the match information in SC  Because all information is caught into SC, no one including the server knows what the customer buys. 18

多媒體網路安全實驗室  C. The Analysis in the Payment Phase 1.SC will check its validity and whether it is double- spending to the bank.The bank can only confirm that the eCASH is approved by the bank or not. 2.For reaching the goal of non-repudiation in the deal  SC saves (ID', C', eCASH) into Database 3.  the secret information C' is encrypted by PK C  So,everyone including the server does not know B i. 19

多媒體網路安全實驗室 CONCLUSIONS  The proposed scheme solves the flaw in the previous PIR schemes which did not consider the e-payment need.  To keep the privacy protection property of PIR schemes, we choose an e-cash scheme using a blind signature.  Let the customer choose a random number r as a blinding factor for protecting his privacy. 20

多媒體網路安全實驗室