Please use this identifier to cite or link to this item:
An Efficient Electronic-payment Protocol with Privacy Protection
|引用:||A. Alaraj and M. Munro, An e-commerce Fair Exchange Protocol for exchanging Digital Products and Payments, IEEE ICDIM 2007, Vol. 1, pp. 248–253, 2007.  A. Alaraj and M. Munro, An efficient e-commerce fair exchange protocol that encourages customer and merchant to be honest, 27th international conference on Computer Safety, Reliability,and Security, Vol. 5219, pp. 193-206, 2008.  M. Al-Fayoumi and S. Aboud, Blind decryption and privacy protection, American Journal of Applied Sciences, Vol. 2, pp. 873-876, 2005.  D. Chaum, Blind signatures for untraceable payments, In Advances in Cryptology - Crypto ’82, Plenum Press (1983) pp. 199-203, 1983.  D. Chaum, A. Fiat, and M. Noar, Untraceable electronic cash, In Advances in Cryptology - Crypto ’88, Vol. 403, pp. 236-247, 1990.  Y. Chen, G. Horng and C. Huang , Privacy Protection in On-line Shopping for Electronic Documents, Information Assurance and Security, Vol. 2, pp. 105-108, 2009. M. Chen, K. Wu and J. Xu, Fair E-Payment Protocol Based on Certificateless Signature and Authenticated Key Exchange, Information Computing and Applications, Vol. 6377, pp.103-110, 2010.  I. Damgard, M. Mambo, and E. Okamoto, Further study on the transformability of digital signatures and the blind decryption, The 1997 symposium on cryptography and information security, SCIS97-33C, 1997.  Y. Dodis and L. Reyzin, Breaking and repairing optimistic fair exchange from PODC 2003, The 3rd ACM Workshop on Digital Rights Management (DRM’03), pp. 47–54, 2003.  R. Gennaro, T. Rabin, and H. Krawczyk, RSA-based undeniable signature, Journal of Cryptology, vol. 13, pp. 397–416, 2000. S. Lin and D. Liu, An incentive-based electronic payment scheme for digital content transactions over the Internet, Journal of Network and Computer Applications, Vol. 32, pp. 589–598, 2009.  S. Micali, Simple and fast optimistic protocols for fair electronic exchange, The twenty-second annual symposium on Principles of distributed computing, pp. 12–19, ACM 2003.  J. M. Park, E. Chong, H. Siegel, and I. Ray, Constructing fair exchange protocols for E-commerce via distributed computation of RSA signatures, The twenty-second annual symposium on Principles of distributed computing, pp. 172–181, ACM 2003.  L. Phong and W. Ogata, Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption, http://eprint.iacr.org/2008/327.pdf . I. Ray, I. Ray and N. Narasimhamurthi, An anonymous and failure resilient fair-exchange e-commerce protocol, Decision Support Systems, Vol. 39, pp. 267-292, 2005.  R. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Commun. ACM, Vol. 21, pp. 120-126, 1978.  W.J. Tsaur , Several security schemes constructed using ECC-based self-certified public key cryptosystems, Applied Mathematics and Computation, Vol. 168, pp. 447-464, 2009.  G. Wang, An abuse-free fair contract signing protocol based on the RSA signature, IEEE Transactions on Information Forensics and Security, Vol. 5, pp. 158–168, 2010.  Y. Yen, T. Wu and N. Lo, A Fair-Exchange E-Payment Protocol For Digital Products with Customer Unlinkability, KSII Transactions on Internet and Information Systems (TIIS), Vol. 6, pp. 2956-2979, 2012.  National Institute of Standards and Technology(NIST) FIPS-197: Advanced Encryption Standard, 2001.  Data Encryption Standard (DES). National Bureau of Standards FIPS Publication 46, 1977.|
With the growing of the information technology, people develop many digital products with multiple functions to make life easier and more convenient. Through a more effective electronic-payment protocol, people can receive their digital products more readily. The goals of an electronic-payment protocol are as follows: to protect consumer’s privacy during message transmission and to protect consumer’s rights during transaction process. In this thesis, we propose an efficient electronic-payment protocol to achieve fair transactions, the anonymity of consumers, unlinkability, and the anonymity of the digital products. The protocol also has an arbitration mechanism to settle disputes over a transaction within the consumer and the merchant. We can reduce the transmission times efficiently through the applications of blind decoding and contract-signing protocols, and also withstand replay attack.
|Appears in Collections:||資訊科學與工程學系所|
Show full item record
TAIR Related Article
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.