TOMIN: Trustworthy Mobile Cash with Expiration-date Attached Author: Rafael Martínez-Peláez and Francisco Rico-Novella. Source: Journal of Software, 2010,

Slides:



Advertisements
Similar presentations
Internet payment systems
Advertisements

Digital Cash Mehdi Bazargan Fall 2004.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
Digital Signatures and Hash Functions. Digital Signatures.
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
1 Secure Credit Card Transactions on an Untrusted Channel Source: Information Sciences in review Presenter: Tsuei-Hung Sun ( 孫翠鴻 ) Date: 2010/9/24.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Digital Cash Present By Kevin, Hiren, Amit, Kai. What is Digital Cash?  A payment message bearing a digital signature which functions as a medium of.
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
Slide 1 Vitaly Shmatikov CS 378 Digital Cash. slide 2 Digital Cash: Properties uDigital “payment message” with properties of cash uUnforgeable Users cannot.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
ELECTRONIC PAYMENT SYSTEMS SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
1 Blind Signatures 盲簽章 Chun-I Fan 范俊逸 E-Commerce & Security Engineering Lab. Department of Computer Science and Engineering National Sun Yat-Sen University.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
1 A practical off-line digital money system with partially blind signatures based on the discrete logarithm problem From: IEICE TRANS. FUNDAMENTALS, VOL.E83-A,No.1.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Module 8 – Anonymous Digital Cash Blind Signatures DigiCash coins.
Electronic Payment Systems. Transaction reconciliation –Cash or check.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 4 Data Authentication Part II.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall E-money.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
1 Optimal Mail Certificates in Mail Payment Applications Leon Pintsov Pitney Bowes 2nd CACR Information Security Workshop 31 March 1999.
An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang.
SecureMR: A Service Integrity Assurance Framework for MapReduce Author: Wei Wei, Juan Du, Ting Yu, Xiaohui Gu Source: Annual Computer Security Applications.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
An Authenticated Payword Scheme without Public Key Cryptosystems Author: Chia-Chi Wu, Chin-Chen Chang, and Iuon-Chang Lin. Source: International Journal.
Pay-TV System with Strong Privacy and Non-Repudiation Protection Ronggong Song, Larry Korba IEEE Transactions on Consumer Electronics Vol.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Lecture 12 E-Commerce and Digital Cash. As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce.
Topic 22: Digital Schemes (2)
Micropayments Revisited Background for Peppercoin scheme By Willer Travassos.
Clemente-Cuervo et al. A PDA Implementation of an Off-line e-Cash Protocol.
Digital Cash. p2. OUTLINE  Properties  Scheme  Initialization  Creating a Coin  Spending the Coin  Depositing the Coin  Fraud Control  Anonymity.
Authors:Weimin Lang, Zongkai Yang, Gan Liu, Wenqing Cheng and Yunmeng Tan Source:Ninth International Symposium on Computers and Communications 2004, Proceedings.
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
An ID-Based Mutual Authentication and Key Exchange Protocol for Low- Power Mobile Devices Authors: Tsu-Yang Wu and Yuh-Min Tseng Source: The Computer Journal.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
How to Make E-cash with Non-Repudiation and Anonymity Ronggong Song, Larry Korba Proceedings of the International Conference on Information.
MSRC: (M)icropayment (S)cheme with Ability to (R)eturn (C)hanges Source: Journal of Information Science and Engineering in review Presenter: Tsuei-Hung.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
A Simple Traceable Pseudonym Certificate System for RSA-based PKI SCGroup Jinhae Kim.
Execute sales transactions. Sales transactions include: Cash or check Debit card sales Credit card sales Layaway sales On approval sale Cash-on-delivery.
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
RSA-based password authenticated key exchange protocol Presenter: Jung-wen Lo( 駱榮問 )
Secure untraceable off-line electronic cash system Sharif University of Technology Scientia Iranica Volume 20, Issue 3, Pp. 637–646, June 2013 Baseri,
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
BZUPAGES.COM E-cash Payment System A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of.
多媒體網路安全實驗室 Private Information Retrieval Scheme Combined with E- Payment in Querying Valuable Information Date: Reporter: Chien-Wen Huang 出處:
多媒體網路安全實驗室 An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security Date:2012/02/16.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Electronic Banking & Security Electronic Banking & Security.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
Efficient Anonymous Cash Using the Hash Chain Member:劉岱穎,吳展奇,林智揚
A flexible date-attachment scheme on e-cash
Chair Professor Chin-Chen Chang Feng Chia University
Practical E-Payment Scheme
ICS 454 Principles of Cryptography
ICS 454 Principles of Cryptography
Presentation transcript:

TOMIN: Trustworthy Mobile Cash with Expiration-date Attached Author: Rafael Martínez-Peláez and Francisco Rico-Novella. Source: Journal of Software, 2010, Vol. 5, No. 6, pp Presenter: Tsuei-Hung Sun ( 孫翠鴻 ) Date: 2010/12/3

2 Outline  Introduction  Motivation  Scheme  Security Analysis  Performance Evaluation  Advantage vs. Weakness  Comment

3 Introduction  Mobile Cash (m-cash) ■An extension of electronic cash (e-cash) for mobile devices ■Mobile commerce Real point of sale Virtual point of sale Person-to-person transaction ■Providing privacy to customers ■Low computational cost

4 Motivation  Bank needs to store all used m-cash to prevent double spending  Mobile device has limit computing ability and storage  The propose scheme ■Using expiration date to prevent bank’s database growing uncontrollably ■Using deposit date to calculating the interest on the m-cash ■Linking m-cash with Merchant’s ID to protect attack steal the e-cash to use

5 α,v C: random r, seed define v = w ∥ δ h i = H w (seed) m = h i ||l i ||v. α = r e H(m) mod n β C: s = r -1 β mod n = H(m) d mod n Phase Initial Withdraw Unblind Bank Customer Merchant ID M (deduct w) Deposit m, s, x, h i-x, ID M, δ 1, G C: h i-x = H i-x (m) F = H(x ∥ h i-x ∥ ID M ∥ δ 1 ) G =H(m ∥ s ∥ F) PK: (e, n) PV: d Verifies v w: The amount to withdraw. δ: Expiration date. ID M : Merchant’s identity. l i : The length of the hash chain. δ 1 : Deposit date. x: The amount to pay and to deposit. Scheme (1/2)

6 Phase BankCustomer Merchant Deposit (deposit w) m, s, x, h i-x, ID M, δ 1, G m’, s’ Verifiesδ 1, v, δ Check h i fresh s e = H(m) mod n h i = H x (h i-x ) s’ = H(m’) d mod n m’ = h i-x ||l i-x ||v Store m, s m’, s’ Verifies δ 1 m, s, x, h i-x, ID M, δ 1, G Scheme (2/2)

7 Security Analysis (1/2)  Withdrawal step ■Bank cannot link signature to Customer ■Bank verifies the correct of pre-defined format  Unblind step ■Customer cannot forge another m-cash (m,s)

8 Security Analysis (2/2)  Deposit step ■Customer cannot use m-cash after the expiration date ■Merchant cannot obtain private information about Customer ■Attacker cannot deposit the m-cash (m,s) into bank account ■Merchant cannot use the renew m-cash (m’,s’)

9 Performance Evaluation(1/3)  Computation cost P 1 : Computational cost of the customer. P 2 : Computational cost of the merchant. P 3 : Computational cost of the bank. P 4 : Number of rounds in the scheme. Table A Performance comparison between our scheme and related schemes. T h : Execution times for hash functions. T exp : Execution times for exponential operations.

10 Performance Evaluation(2/3)  Storage Analysis Table A storage comparison between our scheme and related schemes. P 1 : Storage size of the m-cash. P 2 : Public keys. P 3 : M-cash. 40-bit length: ID M 、 l i 、 r 、 seed 、 x 、 w 64-bit length: δandδ bit length: Large prime in modular operation. 128-bit length: One-way hash function.

11 Performance Evaluation(3/3)  Capability comparison P 1 : Withdrawal date. P 2 : Expiration date. P 3 : Deposit date. P 4 : Controls customer’s database. P 5 : Operations used to attach the date. P 6 : Multiple payments. P 7 : Need to withdraw for each payment. P 8 : Attaches the merchant’s identity to the m-cash. H(.) = One-way hash function. (e, n) = Exponential operation. Table A general comparision between our scheme and related schemes.

12 Advantage vs. Weakness  Advantage ■The expiration date prevent the bank’s database from growing uncontrollably ■Attaching merchant’s identity into m-cash that can prevents any eavesdropper to deposit the m-cash into his or her bank account ■The storage capacity and computational cost are more efficient than previous works  Weakness ■Customer must spend the m-cash before expiring

13 Comment  Transaction records may be linked together after pay the first m-cash  This scheme can’t calculate interest correctly