Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.

Slides:



Advertisements
Similar presentations
Digital Cash Mehdi Bazargan Fall 2004.
Advertisements

Information Assurance Management Key Escrow Digital Cash Week 12-1.
Digital Signatures and Hash Functions. Digital Signatures.
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Digital Cash Present By Kevin, Hiren, Amit, Kai. What is Digital Cash?  A payment message bearing a digital signature which functions as a medium of.
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
Slide 1 Vitaly Shmatikov CS 378 Digital Cash. slide 2 Digital Cash: Properties uDigital “payment message” with properties of cash uUnforgeable Users cannot.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
ELECTRONIC PAYMENT SYSTEMS SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
Zero-Knowledge Proofs And Their Applications in Cryptographic Systems Sultan Almuhammadi ICS 454.
1 Blind Signatures 盲簽章 Chun-I Fan 范俊逸 E-Commerce & Security Engineering Lab. Department of Computer Science and Engineering National Sun Yat-Sen University.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Feb 19, 2002Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Module 8 – Anonymous Digital Cash Blind Signatures DigiCash coins.
Electronic Payment Systems. Transaction reconciliation –Cash or check.
E-Money / Digital Cash Lin Huang. Money / Digital Cash What is Money –Coins, Bill – can’t exist on two places at one time –Bearer bonds: immediate cashable.
ELECTRONIC CASH FALL 2000 COPYRIGHT © 2000 MICHAEL I. SHAMOS CPS 214 Bank Clearing and Settlement Quantum Key Exchange Electronic Cash.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 4 Data Authentication Part II.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Bob can sign a message using a digital signature generation algorithm
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Chapter 4: Intermediate Protocols
Lecture 8 e-money. Today Secure Electronic Transaction (SET) CyberCash On line payment system using e-money ECash NetCash MilliCent CyberCoin.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Lecture 12 E-Commerce and Digital Cash. As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce.
Topic 22: Digital Schemes (2)
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Clemente-Cuervo et al. A PDA Implementation of an Off-line e-Cash Protocol.
Digital Cash. p2. OUTLINE  Properties  Scheme  Initialization  Creating a Coin  Spending the Coin  Depositing the Coin  Fraud Control  Anonymity.
Privacy Enhancing Technologies Spring What is Privacy? “The right to be let alone” Confidentiality Anonymity Access Control Most privacy technologies.
Software Security Seminar - 1 Chapter 5. Advanced Protocols 조미성 Applied Cryptography.
Chapter 6:Esoteric Protocols Dulal C Kar. Secure Elections Ideal voting protocol has at least following six properties 1.Only authorized voters can vote.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
2/16/001 E-commerce Systems Electronic Payment Systems.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Introduction The State of the Art in Electronic Payment Systems, IEEE Computer, September 1997.
Electronic Cash R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 11 September 23, 2004.
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Secure untraceable off-line electronic cash system Sharif University of Technology Scientia Iranica Volume 20, Issue 3, Pp. 637–646, June 2013 Baseri,
BZUPAGES.COM E-cash Payment System A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of.
Section #9: Bitcoins. Digital currency Unique string of bits Use cryptography for security and privacy Not tied to names: hard to trace Finite set of.
TOMIN: Trustworthy Mobile Cash with Expiration-date Attached Author: Rafael Martínez-Peláez and Francisco Rico-Novella. Source: Journal of Software, 2010,
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
多媒體網路安全實驗室 Private Information Retrieval Scheme Combined with E- Payment in Querying Valuable Information Date: Reporter: Chien-Wen Huang 出處:
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
1 Buyer 2. Account ID Valid? 3. Account OK! 5. Transaction Details 1. Account ID 4. Information Goods 6. Satisfied? 7. Accept/Reject or Fraud Indication.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
CS580 Internet Security Protocols Huiping Guo Department of Computer Science California State University, Los Angeles 6. Blind Signature.
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
eCommerce Technology Lecture 13 Electronic Cash
Presentation transcript:

Payment Systems 1

Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that has a fixed value and can be exchanged with a traditional monetary instrument Parties include: – Payer (customer) – Payee (merchant) – Bank 2 Customer Merchant

Transactions Transactions in an electronic payment scheme typically include: – Withdrawal of coins by customer from the bank – Payment of coins by customer to merchant – Deposit of coins by merchant into bank Online scheme: – The bank participates in the payment transaction Offline scheme – The bank does not participate in the payment transaction 3 Customer Merchant $ $ $ $ $ $ withdraw pay deposit

Goals Integrity – Coins cannot be forged – Legitimate transactions are honored Accountability – Transactions cannot be later denied – Disputes can be efficiently settled Privacy – The identity of some parties is not revealed to other parties – Coins cannot be traced to the payer and/or payee (digital cash) 4

Payment with Digital Signatures Coins are random identifiers digitally signed by the bank at the time of withdrawal The merchant verifies the signature by the bank The bank honors deposit of valid coins Security and privacy issues: – Customer can copy coin and double spend – The bank learns about every transaction by customer and merchant 5 Customer Merchant $ $ $ $ $ $ withdraw pay deposit

Private Payment Scheme A blind signature allows the signed to sign a message without knowing the message itself Basic digital cash scheme: – The bank does a blind signature on the coins withdrawn by the customer – The merchant verifies the signature and deposits the coins – The bank cannot link the coins to the customer 6

Blind Signatures with RSA The RSA cryptosystem supports a simple and efficient blind signature scheme Consider an RSA signing scheme with – Public modulus N – Public encryption exponent e and public cryptographic hash function h – Secret decryption exponent d The bank can create a signature on any item without knowing it Bank must have assurance that it is signing a valid coin of the correct amount 7

RSA Blind Signature Protocol The customer picks secret random values x and r – Coin identifier x – Number r in Z N relatively prime to N The customer sends to the bank value y  r e h(x) mod N The bank creates signature  (y) on y  (y)  y d mod N The customer derives from  (y) signature  (x) on x  (x)  (y)  r mod N Proof  (y)  r mod N  r ed  1 h(x) d mod N  h(x) d mod N   (x) 8

Blindly Signing a Valid Coin The customer generates k coins and submits to the bank commitments (cryptographic hashes) for all the coins The bank randomly selects k  1 coins The customer reveals to the bank the selected k  1 coins The bank verifies the commitments on the selected k  1 coins The bank creates a blind signature on the remaining coin The coin signed by the bank is valid with probability 1  1  k 9

Defenses Against Double Spending Online protocol – The bank is online during the payment transaction to revoke spent coins Offline protocol – Withdrawn coins embed encrypted customer identity – Deposited coins embed also encrypted merchant identity – Double spending caused the identity of the cheating party to be revealed 10

Secret Splitting into Shares A secret string x can be split into random values y and z as follows – Pick a random value y – Set z  y  x String x can be reconstructed from y and z by setting – x  y  z Both shares y and z are random values and are referred to as shares of x Neither share reveals any information about secret x 11

Coins Let h be a cryptographic hash function Given a secret string x, a commitment pair for x is a pair (a, b) such that – a  h(y) – b  h(z) – y and z are random shares of x Let ID be a string identifying the customer (e.g., name, address, etc.) The coin issued by the bank to the customer consists of – Coin identifier x – Vector of n commitments pairs (a 1, b 1 ), …, (a n, b n ) for ID The coin does not reveal the identity of the customer 12

Withdrawal The customer generates and submits k coins to the bank The bank randomly selects k  1 coins The customer reveals to the bank the shares associated with the commitments pairs of the selected coins The bank creates a blind signature on the remaining coin The coin signed is valid with probability 1  1  k 13

Payment The customer gives to the merchant a coin { x ; [(a 1, b 1 ), …, (a n, b n )] } The merchant verifies the signature on the coin The customer gives to the customer a random binary vector s 1, …, s n, called selector The customer reveals to the merchant the shares indicated by the selector, i.e., it sends to the merchant a vector of strings P 1, …, P n such that h(P i )  a i if s i  0 h(P i )  b i if s i  1 14

Deposit and Security Properties Deposit – The merchant deposits with the bank the coin and strings P 1, …, P n – The bank verifies the signature and keeps track of coins and associated strings Security properties – The probability that the selectors provided by two merchants are identical is 1  2 n – Thus, if the customer double spends a coin, then the bank finds out the identity of the customer with probability 1  1  2 n – A merchant can double spends a coin without being detected by the bank only if it can find a collision of the hash function The scheme does not prevent double spending but detects it and identifies the culprit with high probability 15

References The electronic cash scheme presented in this lecture is based on the work by David Chaum D. Chaum, A. Fiat, and M. Naor. Untraceable Electronic Cash, in Proc. CRYPTO S. Goldwasser and M. Bellare. Lecture Notes on Cryptography [Section 12.5]