(3.235.25.169) 您好!臺灣時間:2021/04/20 18:18
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:楊庭綸
研究生(外文):Ting-Lun Yang
論文名稱:植基於身份的電子支票系統
論文名稱(外文):An identity-based electronic check system
指導教授:楊伏夷楊伏夷引用關係
指導教授(外文):Fuw-Yi Yang
學位類別:碩士
校院名稱:朝陽科技大學
系所名稱:資訊工程系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:31
中文關鍵詞:電子現金系統電子商務電子支票行動裝置
外文關鍵詞:E-cash SystemE-commerceE-checkMobile Device
相關次數:
  • 被引用被引用:0
  • 點閱點閱:280
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:8
  • 收藏至我的研究室書目清單書目收藏:0
近年來,隨著網路技術的發展與行動裝置的普及化,對於電子商務的應用越來越方便,如果使用者要進行額度較高的消費,可能使用信用卡或是電子支票做為付款方式,可是這兩種付款方式都有各自的差別,線上信用卡付費是輸入使用者的卡片資訊來進行消費,缺點是如果遇到惡意的網站就會造成資料外洩,卡片遭到盜刷,而電子支票的缺點是每使用一次電子支票必須重新申請,以及需要安全通道傳遞電子支票。
本篇論文中,我們設計一個電子支票系統,建置於行動裝置,我們在手機上建置銀行代理人,管理支票,防止支票遭到濫用,使用金鑰交換的方式,確保只有指定的收款者可以解密取得支票訊息,並且利用簽章來認證每個參與者的身份。
In recent years, with the development of Internet technology and popularity of mobile devices, e-commerce applications have been more and more convenient. If the users proceed a higher amount of spending, the payment may be made by credit cards or e-checks. However, the two methods differ from each other. Online credit card payment is processed by entering the cardholder’s information; its disadvantage is the leak of information on the malicious websites so the future unauthorized payment will occur. And the shortcomings of using e-checks are the re-application of the e-check whenever it is used, and the necessity to have a secure channel to transmit the e-checks.
In the thesis, we design an e-check system built in the mobile device. We can set up bank agents in our mobile phones to manage the checks and prevent the unauthorized use of checks. By way of key agreement, it is assured that only the designated recipient can decipher the code and get the check information. And the signature is utilized to authenticate every participant''s identity.
目錄
誌謝 IV
中文摘要 V
ABSTRACT VI
目錄 VII
表目錄 X
圖目錄 XI
第一章 緒論 1
1.1 前言 1
1.2 研究動機 1
1.3 研究目的 2
1.4 論文架構 3
第二章 相關密碼學理論與技術 4
2.1 雙線性配對(Bilinear pairings) 4
2.2 基於身份的加密協定(Identity-based encryption) 4
2.3 基於身份的簽章協定(Identity-based signature scheme) 5
2.4 基於身份的金鑰交換(Identity-based authenticated key agreement) 6
第三章 基於身份的電子支票系統 8
3.1 電子支票系統 8
3.1.1 系統環境流程步驟 8
3.1.2 參數符號定義 9
3.1.3註冊階段 11
3.1.4 提領階段 11
3.1.5 付款階段 15
3.1.6 存款階段 18
第四章 安全性分析和效能分析 20
4.1安全性分析 20
4.1.1唯一性 20
4.1.2正確性 20
4.1.3可識別性 20
4.1.4不可偽造性 20
4.1.5不可否認性 21
4.1.6電子支票遺失 21
4.1.7預防重複消費 21
4.1.8相互驗證 21
4.2效能分析 22
第五章 結論 25
參考文獻 26
附錄A:作者簡介 28
附錄B:口試委員意見修正 29
表目錄
表1.先前學者與我們的方案之功能比較 22
表2.我們的協定之運算成本 23
表3.我們的協定與其他學者協定之通訊量比較 24
圖目錄
圖1.電子支票系統流程圖 8
圖2.電子支票系統-註冊階段 11
圖3.電子支票系統-提領階段 14
圖4.電子支票系統-相互認證階段 17
圖5.電子支票系統-付款階段 18
圖6.電子支票系統-存款階段 19
參考文獻
[1]D. Chaum, “Blind signature for untraceable payments”,In: Proceedingsof advances in Cryptology, pp.199-203, 1983.
[2]D. Chaum, A. Fiat, and M. Naor,“Untraceable electronic cash” ,In: Proceedings of advances in Cryptology, Vol. 403, pp.319-327, 1990.
[3]W. S. Juang and H. T. Liaw, “A practical anonymous multi-authority e-cashscheme”,Applied Mathematics and Computation, Vol. 147, No. 3, pp. 699-711, 2004.
[4]C. L. Chen and M. H. Liu, “A traceable E-cash transfer system against blackmail via subliminal channel”,Electronic Commerce Research and Applications, Vol. 8, No. 6, pp. 327-333, 2009.
[5]D. Chaum, B. D. Boer, and E. V. Heyst, S. Mjolsnes, A.Steenbeek, “Efficient offline electronic check”, In: Proceedings of advances in Cryptology, Vol. 434, pp. 294-301, 1989.
[6]W. K. Chen, “Efficient offline electronic check”, In: Proceedings of advances in Cryptology, Vol. 162,pp. 1259-1263, 2005.
[7]C.C. Chang, S.C.Chang and J. S. Lee, “An on-line electronic checks system with mutual authentication”,Computers& Electrical Engineering, Vol. 35,pp. 757-763, Sep. 2009.
[8]劉鎮緯, “行動付費系統與電子支票系統之研究”,朝陽科技大學碩士論文, 2010.
[9]F. Y. Yang, Z. W. Liu, and S. H. Chiu, “An electronic check system with efficient online computational ability”, Journal of Convergence Information Technology, Vol. 6, No. 12, pp. 210-219, Dec. 2011.
[10]Y.Xu and J. Liu, “Electronic check system design based on NFC,” Management and Service Science ,Vol. 147, No. 3, pp. 1-4, 2009.
[11]D. Y. Zhao, T. Liu and Q. Li, “An iD-based key exchange protocol in wireless sensor networks”, Energy Procedia, Vol. 13, pp.2316-2321, 2011.
[12]D. Boneh and M. Franklin, “Identity-base encryption from the Weil pairing,” Appears in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
[13]M. Bellare and P. Rogaway, “Random oracles are practical: a paradigm for designing efficient protocols”, Proc. of the 1st ACM on Computer and Communications Security CCs’93, ACM press, pp.354-368, 2002.
[14]D. Boneh, M. Shacham, and B. Lynn, “Short signatures from the Weil-pairing”, Advances in Cryptology –Asiacrypt‘2001, Vol. 2248, pp. 514-532, 2001.
[15]T. Okamoto and D. Pointcheval, “The gap-problem: a new class of problems for the security of cryptographic schemes”, Lecture Notes in Computer Science, pp. 104-118, 2001.
[16]C. Racko, D. Simon, “Non-interactive zero-knowledge proof of knowledge and chosen ciphertextattack",Lecture Notes in Computer Science, Vol. 576, pp. 433-444, 1992.
[17]F. Hess, “Efficient identity based signature schemes on pairings”,Computer Science, Vol. 2595, pp. 310-324, 2003.
[18]M.Holbl, T. Welzer and B. Brumen, “An improved two-party identity-based authenticated key agreement protocol using pairings”, Journal of Computer and System Sciences, Vol. 78, pp. 142-150, 2012.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔