An Anonymous Fair- Exchange E-Commerce Protocol Indrajit Ray Computer Science Department Colorado State University

Slides:



Advertisements
Similar presentations
Internet payment systems
Advertisements

Atomic Transactions CS523 - Spring Brian Schmidt.
Secure Multiparty Computations on Bitcoin
CP3397 ECommerce.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
Electronic Transaction Security (E-Commerce)
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS eCommerce Technology Lecture 10 Micropayments I.
Your Presenter Amer Sharaf Electronic Payments: Where do we go from here? ByMarkus Jakobsson David Mraihi Yiannis Tsiounis Moti Yung.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
Privacy-preserving e-payments using one-time payment details Author:Mafruz Zaman Ashrafi and See Kiong Ng Source: Computer Standards & Interfaces 31 (2009)
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
“Electronic Payment System”
Electronic Payment Systems. Transaction reconciliation –Cash or check.
Financial Transactions on Internet Financial transactions require the cooperation of more than two parties. Transaction must be very low cost so that small.
Electronic Payment Systems In any commercial transaction payment is an integral part for goods supplied. Four types of payments may be made in e-commerce.
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
Supporting Technologies III: Security 11/16 Lecture Notes.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Copyright © 2002 Pearson Education, Inc. Slide 6-1.
Electronic Payment Systems
Chris Olston, cs294-7, Spring Atomicity in Electronic Commerce J. D. Tygar -- UCB presented by Chris Olston.
Secure Electronic Transaction (SET)
1 Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats –integrity –confidentiality.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Lecture 12 E-Commerce and Digital Cash. As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce.
ECE Prof. John A. Copeland fax Office: Klaus 3362.
Secure Socket Layer (SSL) and Secure Electronic Transactions (SET) Network Security Fall Dr. Faisal Kakar
Web Security : Secure Socket Layer Secure Electronic Transaction.
Electronic Cash. Digicash: Ecash u “With ecash you can pay for access to a database, buy software ora newsletter by ,play a computer game over the.
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
Four Attacks on an Anonymous Fair Exchange E-commerce Protocol Adam Barth Andrew Tappert CS259.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices (Part B)
Security Digital Cash Onno W. Purbo
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
Fall 2006CS 395: Computer Security1 Key Management.
A Secure Online Card Payment Protocol VIJAY CHOUDHARY M.Tech(IS), DTU.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Electronic Banking & Security Electronic Banking & Security.
Henric Johnson1 Secure Electronic Transactions An open encryption and security specification. Protect credit card transaction on the Internet. Companies.
Chapter 7 - Secure Socket Layer (SSL)
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Presentation transcript:

An Anonymous Fair- Exchange E-Commerce Protocol Indrajit Ray Computer Science Department Colorado State University

Outline  Motivation Fair-exchange Cross-validation Anonymity  Background  Protocol Description  Conclusion

Motivation Fair Exchange

The Problem I want to purchase Mento Madness No problem! That will be $25 Your financial info is 128 bit SSL encrypted Okay here is an e-check for $25

The Problem He! He! That’s my 10th victim today. Bye Bye

Tough luck lady! We cannot trace him !! The Problem Complain!

What’s Needed? – Fair Exchange  Must ensure that no player suffers owing to the malicious behavior of the other player Either both players receive each other’s commodities or none do  Strong or true fair-exchange Gather enough evidence so that wrong doer can be brought to justice  Weak fair-exchange

Motivation (2) Cross Validation

The Problem I want to purchase Mento Madness No problem! That will be $25 Your financial info is 128 bit SSL encrypted Good!! Here is Mento Madness Okay here is $25

The Problem He! He! That’s my 20th victim today. This is Getting better all the time

The Problem This is not Mento Madness!! This is garbage!!!! Tough luck lady! We cannot trace him!! Complain!

The Solution – Cross Validation  Ensure (somehow) that the product the customer is about to receive from the merchant is indeed the product he is paying for

Motivation (3) Anonymity

The Problem I want to purchase Mento Madness No problem! That will be $25 Good!! Here is Mento Madness Here is my guarantee Thank you – here is $25

The Problem This lady likes Jamaican music!! Spam her with other offers

The Problem I am receiving zillions of SPAM Tough luck lady! You missed the fine prints. This is not SPAM Complain!

The Solution  Ensure that a transaction cannot be linked to or traced back to a particular customer  Optionally ensure the same for the merchant

Background Theory of Cross Validation

Nature of Keys Used  Asymmetric keys   Two keys K 1 and K 2 are said to be compatible if

Nature of Keys Used (2)  The product of two compatible keys K 1 and K 2 is defined as Used by customer for product validation

Protocol - The Actors  Customer For this transaction assumes a pseudo identity C

Protocol - The Actors  Customer  Merchant

Protocol - The Actors  Customer  Merchant  Customer’s bank

Protocol - The Actors  Customer  Merchant  Customer’s bank  Merchant’s bank

Protocol - The Actors  Customer  Merchant  Customer’s bank  Merchant’s bank  Trusted third party

Protocol - Step 0  Merchant registers with third party Sends the product (m), its description (d) and keys Third party validates description against product Third party uploads to its web site

Protocol - Step 0  Customer selects a product m, to download based on the description Downloads  Customer generates a one time public / private key pair

Protocol - Step 1  Customer indicates intent to purchase by sending Signed Purchase order Pseudo identity C and one time public key, C ipub Digest of PO signed by one time private key

Protocol - Step 2  Merchant sends to customer Counter signed digest of PO Product m encrypted with key Merchant’s bank account information encrypted with merchant’s bank’s public key

Protocol - Step 3  Customer validates product Compares downloaded product with that received from merchant  Sends money transfer instruction to bank Customer’s account number (C acct ) and amount to be transferred to encrypted account

Protocol - Step 4  Bank debits customer’s account and sends signed payment token to customer  Payment token, P contains Amount paid Nonce to prevent replays  Signed checksum of P

Protocol - Steps 5 & 6  Customer sends signed payment token to Merchant  Merchant forwards signed payment token to its bank

Protocol - Step 7  Merchant’s bank Verifies CB’s signature on payment token Decrypts Credits merchant’s account by amount given in payment token Sends acknowledgment to merchant

Protocol - Step 8  Merchant sends product decryption key,, encrypted with customer’s one time public key,

Analysis of Fair Exchange  Customer’s misbehavior does not create problem Unless proper amount is credited to merchant’s bank, merchant does not send decryption key If customer maliciously claims merchant’s misbehavior, customer needs to produce

Analysis of Fair Exchange  Merchant may not send decryption key after receiving payment Customer complains to trusted third party by producing If claim substantiated, trusted third party can provide customer with m

Analysis of Cross-Validation  Customer validates,downloaded from trusted third party with received from merchant Recall  Pays if and only if the validation is successful

Analysis of Anonymity  No single party has enough information to link customer to merchant  No collusion is possible which will result in the disclosure of this information. To collude, two parties Must know each other’s identity and Must have some common piece of information pertaining to the transaction

Analysis of Anonymity InformationCustomer’s BankMerchant’s BankMerchantThird Party Customer’s IDYesNo Cust. Bank’s IDYes No Merc. Bank’s IDNoYes No Merchant’s IDNoYes No Third Party’s IDNo Yes Cust. AccountYesNo Merc. AccountNoYes No Purchase OrderNo YesMaybe C ipub No YesMaybe C pub YesNo YesMaybe No Yes No YesMaybe Payment tokenYes Maybe

Conclusions  Fair Exchange protocol that ensures cross validation of product as well as anonymity of customer  Minimal use of trusted third party Used only when something goes wrong

Questions