PAYWORD, MICROMINT -TWO MICROPAYMENT SCHEMES PROJECT OF CS 265 SPRING, 2004 WRITTEN BY JIAN DAI.

Slides:



Advertisements
Similar presentations
Costs and Benefits.
Advertisements

A business makes payments for what it buys, In return it receives payments for goods it sells or services it provides.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Electronic Payment Systems Speaker: Jerry Gao Ph.D. San Jose State University URL: May,
Computer Science Dr. Peng NingCSC 774 Advanced Network Security1 Topic 3.2: Micro Payments.
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
VarietyCash: A Multi-purpose Electronic Payment System By M. Bellare, J. Garay, C. Jutla, M. Yung By Liang Li Chris March 29th.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Digital Cash Present By Kevin, Hiren, Amit, Kai. What is Digital Cash?  A payment message bearing a digital signature which functions as a medium of.
Copyright 1996 RSA Data Security, Inc. All rights reserved.Revised 1/1/96 PayWord and MicroMint: Two Simple MicroPayment Schemes Ronald L. Rivest (MIT)
Slide 1 Vitaly Shmatikov CS 378 Digital Cash. slide 2 Digital Cash: Properties uDigital “payment message” with properties of cash uUnforgeable Users cannot.
Class 12 Anonymous Digital Currency CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Bitcoin. What is Bitcoin? A P2P network for electronic payments Benefits: – Low fees – No middlemen – No central authority – Can be anonymous – Each payment.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Bitcoin Double Spending Attack Karame, Androulaki & Capkun Presented by Subhro Kar CSCE 715, Fall 2013.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
FIT3105 Smart card based authentication and identity management Lecture 4.
K. Salvevold Accounting Protecting Cash $ It is important to protect cash from loss, waste, theft, forgery, and embezzlement $ Cash is protected through.
ELECTRONIC PAYMENT SYSTEMS SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 9: Micropayments I.
Micro-Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University URL:
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 10 Micropayments II.
1 Formal Specification and Verification of a Micropayment Protocol Alex X. Liu The University of Texas at Austin, U.S.A. October 13, 2004 Co-author: Mohamed.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
ELECTRONIC PAYMENT SYSTEMS SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 9: Micropayments II.
Money Management Skills
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS eCommerce Technology Lecture 10 Micropayments II.
E-Commerce E-Marketing By: Sadiq Ahmed Shariff S ail.com E-Business.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Money Management Skills
Revise Lecture 24. Managing Cash flow Shortages 3 Approaches 1.Moderate approach 2.Conservative approach 3.Aggressive approach.
Bitcoin (what, why and how?)
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
Money Management Skills
INTRODUCTION TO BUSINESS & MARKETING CREDIT. Objectives Compare the types of consumer credit Describe the advantages and disadvantages of using credit.
Traditional and Electronic Payment Methods Chapter 3.
Lecture 11: Strong Passwords
An Authenticated Payword Scheme without Public Key Cryptosystems Author: Chia-Chi Wu, Chin-Chen Chang, and Iuon-Chang Lin. Source: International Journal.
Lecture 8 e-money. Today Secure Electronic Transaction (SET) CyberCash On line payment system using e-money ECash NetCash MilliCent CyberCoin.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Micropayments Revisited Background for Peppercoin scheme By Willer Travassos.
Clemente-Cuervo et al. A PDA Implementation of an Off-line e-Cash Protocol.
Digital Cash. p2. OUTLINE  Properties  Scheme  Initialization  Creating a Coin  Spending the Coin  Depositing the Coin  Fraud Control  Anonymity.
Bitcoins and the Digital Economy Presented By: Matt Blackman.
Authors:Ching-Nung Yang and Hsu-Tun Teng Source:IEEE International Conference on E- Commerce, 2003(CEC 2003), June 2003, Pages: 45 – 48 Date:2005/01/20.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Chapter 9 Checking Accounts.
MSRC: (M)icropayment (S)cheme with Ability to (R)eturn (C)hanges Source: Journal of Information Science and Engineering in review Presenter: Tsuei-Hung.
Cryptography and Network Security (CS435) Part One (Introduction)
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Micro-Payment Payment method for very small amount of money. Based on cumulative transactions. Players, i.e.: ‣ CyberCoin (typically $0.25-$10) ‣ PayWord.
2/16/001 E-commerce Systems Electronic Payment Systems.
Module 9 Micropayment systems. Properties of micropayment systems Micropayments do not have a real-world cash equivalent – cash cannot be divided into.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Micropayments Revisited Ronald L. Rivest (with Silvio Micali) MIT Laboratory for Computer Science RSA Conference 2002.
International Trade Trading Goods and Services. Specialization and Trade: Everyone Benefits Specialization: We specialize by doing just one kind of job.
SECURE MICROPAYMENT SCHEME FOR NEWSPAPER SUBSCRIPTION Pay Per Article Dr. M. Sandirigama Fasna JF. Irfan MAM. Rishadhy MJM.
Private key
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
INVESTMENT  acquisition of capital assets, (buildings, machinery, stocks, bonds and shares) SHARES  part ownership of a company BROKER  licensed.
Secure untraceable off-line electronic cash system Sharif University of Technology Scientia Iranica Volume 20, Issue 3, Pp. 637–646, June 2013 Baseri,
SAVINGS – Plan for Financial Security. Why Save?Savings is a trade off. You agree to save now in order to spend in the future.  Save for the Unexpected.
Copyright 2007 Thomson South-Western Chapter 5 Banking Procedures.
Homework #2 J. H. Wang Oct. 31, 2012.
Multi-Vendor PayWord with Payment Approval Andrea Huszti University of Debrecen Debrecen, Hungary.
Practical E-Payment Scheme
Overview of Micropayment Technology
Presentation transcript:

PAYWORD, MICROMINT -TWO MICROPAYMENT SCHEMES PROJECT OF CS 265 SPRING, 2004 WRITTEN BY JIAN DAI

INTRODUCTION Micropayments were introduced when Internet boomed in 1990’s Many Micropayment implements have failed with the burst of Internet bubble. It get attention again recently with the change of economic environment

Characters of Micropayment The amount of each transaction is very small The efficiency and low cost of transaction are extremely important. The relation between the payer and payee intends to be transient The security of transaction can be comprised a little in order to achieve the efficiency and reduce cost

Payword - Algorithm Credit-based schema. User needs to get a certificate from broker first User use a hash function to create payword chain in reverse order based on certificate The public hash function: w i = h(w i+1 ) The payword chain is user and vendor specific. User needs to send certificate and the root of the payword chain to vendor at the beginning of payment. The user user the chain in order. Based on the last payword w l received, the vendor can decide the total payment. The vendor submit the payword received and get redeem from broker at the end of the day

Payword - Advantages Can prevent forgery and double spending Use off-line schema to minimize communication with broker Do not need to sign every payment and can reduce the public key operation dramatically. It is specially good if a user pay a special vendor many times a day The relationship between user and vendor is transient

Payword - Disadvantages The user must set up an account with a broker. The relationship between them is long-term Still need public key operation Not very good in the scenario that a user needs to pay many vendors. The vendors must adopt brokers’ protocols. There exists a bond between vendors and brokers

MicroMint – Algorithm I The broker use so-called “k-way hash collisions” to produce coin. Each coin has the property that they will have the same hash result under a special hash function. It is very difficult to find the first “hash collisions” result. After then, the growth rate of the number of such results will be exponential. So the unit cost of each coin for broker is low when the broker make high volume of coins. On the other hand, the unit cost will be too high to worth for a hacker to try. Over the time, the coin will become more and more vulnerable to attack. Therefore, the coins need to be changed from time to time.

MicroMint – Algorithm II A user buy coins from broker. Then, the user buy contents from an vendor with coins. The vendor collect the coins and get redeem from broker at the end of the day. The broker needs to trace the users’ records in order to prevent the “double-spending” The broker also need to replaced the unused coins with the new coins at the end of the month

MicroMint – Advantages Not public key operation at all. Can prevent forgery and double-spending effectively Broker is off-line The hash function and criteria are public. The vendor can verify coins easily.

MicroMint – Disadvantages Need big one-time investment and need high demand for coin Broker need to keep users’ records to prevent “double spending” The security is not guaranteed because it is based on some assumptions The coins need to be changed from time to time.

Properties of a good Micropayment Good Transaction Security. The system should be able to prevent from any forging Low Cost. The total security operation cost and transaction cost should be very low Anonymous. Ideally, the relationship between vendor and user is transient. A vendor can work with any broker, and vice versa. Easy to use. The transaction should be very efficient. Ideally, it should be an “one-click” procedure