Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/19701
標題: 關於數位內容的公平電子付款系統之研究
The Study of a Fair Electronic Payment System for Digital Content
作者: 廖俊傑
Liao, Jyun-Jie
關鍵字: subliminal channel;潛隱通道;fair transaction;payment system;digital content;ownership arbitration;公平性的交易;付款系統;數位內容;所有權的仲裁
出版社: 資訊科學與工程學系所
引用: [1] Menezes, A., Oorschot, P.van and Vanstone, S. (1997) Handbook of Applied Cryptography. CRC Press LLC. [2] ElGamal, T. (1985) A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, 31(4), 469-472. [3] Rabin, M.O. (1979) Digital signatures and public-key functions as intractable as factorization, MIT Laboratory for Computer Science, Technical Report, MIT/LCS/TR212 [4] Schnorr, C.P. (1990) Efficient identification and signatures for smart cards, Advances in Cryptology--CRYPTO'89, LNCS, Springer-Verlag, 435, 239-252. [5] Rivest, R.L., Shamir, A. and Adleman, L. (1978) A method for obtaining digital signatures and public key cryptosystems, Communication of the ACM, 21(2), 120-126. [6] Chan, C. W. and Chang, C. C. (2006) A New Scheme for the Electronic Coin, IEEE International Conference on e-Business Engineering (ICEBE''06), Shanghai, China, 24-26 October, pp.339-343, IEEE Computer Society, Los Alamitos, CA. [7] Fan, C. I., Liang, Y. K. and Lin, B.W. (2006) Fair Transaction Protocols Based on Electronic Cash, Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, Taipei, Taiwan, 04-07 December, pp.383-388, IEEE Computer Society, Los Alamitos, CA. [8] Hou, X. and Tan, C. H. (2005) On fair traceable electronic cash, 3rd Annual Communication Networks and Services Research Conference, Halifax, N.S., Canada, 16-18 May, pp.39-44, IEEE Computer Society, Los Alamitos, CA. [9] Chang, C.C., Chang, S.C. and Lee, J.S. (2009) An on-line electronic check system with mutual authentication, Computers and Electrical Engineering, 35(5), 757-763. [10] Wang, H., Cao, Y. and Zhang, Y. (2005) A flexible payment scheme and its role-based access control, IEEE Transactions on Knowledge and Data Engineering, 17(3), 425-436. [11] Franklin, M. K. and Reiter, M. K.(1997) Fair Exchange with a Semi-Trusted Third Party, Proceedings of the 4th ACM Conference on Computer and communications Security, April, 1 - 5. [12] Zhou, J. and Gollman, D.(1996) A Fair Non-repudiation Protocol, Proceedings of the 1996 IEEE Symposium on Security and Privacy, IEEE Computer Press, Oakland, CA, 55-61. [13] Lin, S. J. and Liu, D. C. (2009) An incentive-based electronic payment scheme for digital content transactions over the Internet, Journal of Network and Computer Applications, 32(3), 589-598. [14] Fan, C.I., Chen, M.T. and Sun, W. Z. (2009) Buyer-Seller Watermarking Protocols with Off-line Trusted Parties, International Journal of Ad Hoc and Ubiquitous Computing, 4(1), 36-43. [15] Ibrahim, I. M., El-Din, S. H. N. and Hegazy, A. F. A. (2007) An Effective and Secure Buyer-Seller Watermarking Protocol, In third International Symposium on Information Assurance and Security (IAS 2007), 21-26. [16] Deng, M. and Preneel, B. (2008) On secure and anonymous buyer-seller watermarking protocol, The Third International Conference on Internet and Web Applications and Services, pp.524-529. IEEE Computer Society, Washington, DC, USA [17] Katzenbeisser, S., Lemma, A., Celik, M. U., Veen, M. van der and Maas, M. (2008) A Buyer-Seller Watermarking Protocol Based on Secure Embedding, IEEE Transactions on Information Forensics and Security, 3(4), 783-786. [18] Simmons, G. J. (1983) The Prisoner's Problem and the Subliminal Channel, Proceedings of Crypto ''83, Springer-Verlag, 51-67. [19] Simmons, G. J. (1985) The Subliminal Channel and Digital Signatures, Proceedings of the Eurocrypt ''84 workshop on Advances in Cryptology, 364-378. [20] Simmons, G. J. (1993) Subliminal Communication is Easy Using the DSA, Proceedings of Eurocrypt ''93, 218-232. [21] Simmons, G. J. (1998) The history of subliminal channels, IEEE Journal on Selected Areas in Communications, 16(4) 452-462. [22] Huang, Z., Chen, D. and Wang, Y (2005) Multi-signature with anonymous threshold subliminal channel for ad-hoc environments, The 19th International Conference on Advanced Information Networking and Applications, 67-71. [23] Lee, N. Y. and Ho, P. H. (2003) Digital signature with a threshold subliminal channel, IEEE Transactions on Consumer Electronics, 49(4), 1240-1242. [24] Chen, C. L. and Liu, M. H. (2009) A traceable E-cash transfer system against blackmail via subliminal channel, Electronic Commerce Research and Applications 8(6), 327-333. [25] Nyberg, K. and Rueppel, R. A. (1993) A New Signature Scheme Based on the DSA Giving Message Recovery, Proceedings of the 1st ACM Conference on Computer and Communications Security, November 3-5 Fairfax, Virginia, US, 58-61. [26] Schnorr, C. (1991) Efficient Signature Generation by Smart Cards, Journal of Cryptology, 4(3), 161-174. [27] Wang, J. H., Liu, J. W. and Li, X. H. (2009) Fair e-payment protocol based on blind signature, The Journal of China Universities of Posts and Telecommunications, 16(5), 114-118. [28] Cao, T., Lin, D. and Xue, R. (2005) A randomized RSA-based partially blind signature scheme for electronic cash, Computes & Security 28 January, 24, 44-49. [29] Wang, C. and Xuan, H. (2006) A Fair Off-line Electronic Cash Scheme Based on RSA Partially Blind Signature, Proceedings of the 1st International Symposium on Pervasive Computing and Applications, pp.508-512. [30] Wang, Z.G. and Wan, Z.K. (2009) A secure Off-line Electronic Cash Scheme Based on ECDLP, First International Workshop on Education Technology and Computer Science, Wuhan, Hubei, China, 07-08 March, 2, pp.30-33.
摘要: 
因為網路的流行和方便,使得越來越多的消費者透過網路購買數位產品。然而,大量的數位內容產品也變得更容易偽造和取得。因此,如何證明誰是合法數位內容的擁有者成為一個重要問題。許多研究者提出不同買賣浮水印的機制,在安全付款系統藉此保護消費者的所有權。在本文中,我們將藉由潛隱通道的觀念來維護客戶的所有權,並提出一個完整的仲裁機制,以解決消費者和商家雙方之間的公平交易。為了實現上述目標,此協定的安全性基於五種加密技術,包含:潛隱通道,Nyberg-Rueppel機制,單向赫序函數,Schnorr簽章法和RSA密碼系統。我們提出了兩個付款方案:建立在解離散對數安全性問題的線上交易系統和建立在解質因數分解安全性問題的離線交易系統。我們的方案不僅可以保護客戶合法的數位內容擁有權,而且可以達到交易的公平性和客戶的隱密性,提款現金的所有權追蹤和交易過程的安全性。

More and more customers purchase digital contents through the Internet due to its b popularity and convenience. However, there are a multitude of pirated editions of digital products that have become more available and easier to attain. Therefore, proving the legal ownership of digital contents has becomes more important than ever before. Many researchers have proposed various schemes to protect consumer''s ownership with watermarking mechanisms on secure payment systems. In this paper, we want to preserve customer's ownership via subliminal message and propose an intact arbitration mechanism to solve the fairness of transactions between both the customer and the shop. In order to achieve above objectives, the security of this protocol employs five cryptographic techniques including the subliminal channel, Nyberg-Rueppel scheme, one-way hash function, Schnorr signature scheme and RSA cryptosystem. We propose two payment schemes: on-line payment system based on discrete logarithms problem and off-line payment system based on factoring problem. Our schemes not only protect customer's legal ownership of digital content, but also achieve fair transaction, customer anonymity, owner tracing of coin and payment security.
URI: http://hdl.handle.net/11455/19701
其他識別: U0005-2007201014025000
Appears in Collections:資訊科學與工程學系所

Show full item record
 
TAIR Related Article

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.