Please use this identifier to cite or link to this item:
The Study of a Fair Electronic Payment System for Digital Content
|關鍵字:||subliminal channel;潛隱通道;fair transaction;payment system;digital content;ownership arbitration;公平性的交易;付款系統;數位內容;所有權的仲裁||出版社:||資訊科學與工程學系所||引用:|| Menezes, A., Oorschot, P.van and Vanstone, S. (1997) Handbook of Applied Cryptography. CRC Press LLC.  ElGamal, T. (1985) A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, 31(4), 469-472.  Rabin, M.O. (1979) Digital signatures and public-key functions as intractable as factorization, MIT Laboratory for Computer Science, Technical Report, MIT/LCS/TR212  Schnorr, C.P. (1990) Efficient identification and signatures for smart cards, Advances in Cryptology--CRYPTO'89, LNCS, Springer-Verlag, 435, 239-252.  Rivest, R.L., Shamir, A. and Adleman, L. (1978) A method for obtaining digital signatures and public key cryptosystems, Communication of the ACM, 21(2), 120-126.  Chan, C. W. and Chang, C. C. (2006) A New Scheme for the Electronic Coin, IEEE International Conference on e-Business Engineering (ICEBE''06), Shanghai, China, 24-26 October, pp.339-343, IEEE Computer Society, Los Alamitos, CA.  Fan, C. I., Liang, Y. K. and Lin, B.W. (2006) Fair Transaction Protocols Based on Electronic Cash, Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, Taipei, Taiwan, 04-07 December, pp.383-388, IEEE Computer Society, Los Alamitos, CA.  Hou, X. and Tan, C. H. (2005) On fair traceable electronic cash, 3rd Annual Communication Networks and Services Research Conference, Halifax, N.S., Canada, 16-18 May, pp.39-44, IEEE Computer Society, Los Alamitos, CA.  Chang, C.C., Chang, S.C. and Lee, J.S. (2009) An on-line electronic check system with mutual authentication, Computers and Electrical Engineering, 35(5), 757-763.  Wang, H., Cao, Y. and Zhang, Y. (2005) A flexible payment scheme and its role-based access control, IEEE Transactions on Knowledge and Data Engineering, 17(3), 425-436.  Franklin, M. K. and Reiter, M. K.(1997) Fair Exchange with a Semi-Trusted Third Party, Proceedings of the 4th ACM Conference on Computer and communications Security, April, 1 - 5.  Zhou, J. and Gollman, D.(1996) A Fair Non-repudiation Protocol, Proceedings of the 1996 IEEE Symposium on Security and Privacy, IEEE Computer Press, Oakland, CA, 55-61.  Lin, S. J. and Liu, D. C. (2009) An incentive-based electronic payment scheme for digital content transactions over the Internet, Journal of Network and Computer Applications, 32(3), 589-598.  Fan, C.I., Chen, M.T. and Sun, W. Z. (2009) Buyer-Seller Watermarking Protocols with Off-line Trusted Parties, International Journal of Ad Hoc and Ubiquitous Computing, 4(1), 36-43.  Ibrahim, I. M., El-Din, S. H. N. and Hegazy, A. F. A. (2007) An Effective and Secure Buyer-Seller Watermarking Protocol, In third International Symposium on Information Assurance and Security (IAS 2007), 21-26.  Deng, M. and Preneel, B. (2008) On secure and anonymous buyer-seller watermarking protocol, The Third International Conference on Internet and Web Applications and Services, pp.524-529. IEEE Computer Society, Washington, DC, USA  Katzenbeisser, S., Lemma, A., Celik, M. U., Veen, M. van der and Maas, M. (2008) A Buyer-Seller Watermarking Protocol Based on Secure Embedding, IEEE Transactions on Information Forensics and Security, 3(4), 783-786.  Simmons, G. J. (1983) The Prisoner's Problem and the Subliminal Channel, Proceedings of Crypto ''83, Springer-Verlag, 51-67.  Simmons, G. J. (1985) The Subliminal Channel and Digital Signatures, Proceedings of the Eurocrypt ''84 workshop on Advances in Cryptology, 364-378.  Simmons, G. J. (1993) Subliminal Communication is Easy Using the DSA, Proceedings of Eurocrypt ''93, 218-232.  Simmons, G. J. (1998) The history of subliminal channels, IEEE Journal on Selected Areas in Communications, 16(4) 452-462.  Huang, Z., Chen, D. and Wang, Y (2005) Multi-signature with anonymous threshold subliminal channel for ad-hoc environments, The 19th International Conference on Advanced Information Networking and Applications, 67-71.  Lee, N. Y. and Ho, P. H. (2003) Digital signature with a threshold subliminal channel, IEEE Transactions on Consumer Electronics, 49(4), 1240-1242.  Chen, C. L. and Liu, M. H. (2009) A traceable E-cash transfer system against blackmail via subliminal channel, Electronic Commerce Research and Applications 8(6), 327-333.  Nyberg, K. and Rueppel, R. A. (1993) A New Signature Scheme Based on the DSA Giving Message Recovery, Proceedings of the 1st ACM Conference on Computer and Communications Security, November 3-5 Fairfax, Virginia, US, 58-61.  Schnorr, C. (1991) Efficient Signature Generation by Smart Cards, Journal of Cryptology, 4(3), 161-174.  Wang, J. H., Liu, J. W. and Li, X. H. (2009) Fair e-payment protocol based on blind signature, The Journal of China Universities of Posts and Telecommunications, 16(5), 114-118.  Cao, T., Lin, D. and Xue, R. (2005) A randomized RSA-based partially blind signature scheme for electronic cash, Computes & Security 28 January, 24, 44-49.  Wang, C. and Xuan, H. (2006) A Fair Off-line Electronic Cash Scheme Based on RSA Partially Blind Signature, Proceedings of the 1st International Symposium on Pervasive Computing and Applications, pp.508-512.  Wang, Z.G. and Wan, Z.K. (2009) A secure Off-line Electronic Cash Scheme Based on ECDLP, First International Workshop on Education Technology and Computer Science, Wuhan, Hubei, China, 07-08 March, 2, pp.30-33.||摘要:||
More and more customers purchase digital contents through the Internet due to its b popularity and convenience. However, there are a multitude of pirated editions of digital products that have become more available and easier to attain. Therefore, proving the legal ownership of digital contents has becomes more important than ever before. Many researchers have proposed various schemes to protect consumer''s ownership with watermarking mechanisms on secure payment systems. In this paper, we want to preserve customer's ownership via subliminal message and propose an intact arbitration mechanism to solve the fairness of transactions between both the customer and the shop. In order to achieve above objectives, the security of this protocol employs five cryptographic techniques including the subliminal channel, Nyberg-Rueppel scheme, one-way hash function, Schnorr signature scheme and RSA cryptosystem. We propose two payment schemes: on-line payment system based on discrete logarithms problem and off-line payment system based on factoring problem. Our schemes not only protect customer's legal ownership of digital content, but also achieve fair transaction, customer anonymity, owner tracing of coin and payment security.
|Appears in Collections:||資訊科學與工程學系所|
Show full item record
TAIR Related Article
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.