跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.85) 您好!臺灣時間:2025/01/21 17:48
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:劉智育
研究生(外文):Chih-Yu Liu
論文名稱:具匿名性及無須指定商家之安全微付款系統
論文名稱(外文):A secure micropayment system with anonymity and vendor-nonspecific property
指導教授:王智弘王智弘引用關係
指導教授(外文):Chih-Hung Wang Ph. D
學位類別:碩士
校院名稱:國立嘉義大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2005
畢業學年度:93
語文別:中文
論文頁數:73
中文關鍵詞:微付款系統電子商務無線付款雙重消費赫序鏈
外文關鍵詞:Micropayment SystemE-commerceWireless PaymentDouble SpendingHash Chain
相關次數:
  • 被引用被引用:0
  • 點閱點閱:298
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
目前無線網路日漸發達,而無線付款機制卻還在萌芽階段,本篇論文提出一個在無線環境底下,使用赫序鏈(hash chain)與不平衡單向二元樹(unbalanced one-way binary tree)的技術有效率地付款並且在向銀行提領款項時無須先指定商家(vendor-nonspecific)的安全微付款(micropayment)機制,本機制還提供了強健的安全度與使用匿名來保護使用者隱私,整個系統的使用者提款與商家存款是在離線下進行,交易時使用者只需傳單一訊息給商家就可以達到付款效果,這樣使得在無線上傳輸非常有效率。除此之外,在安全性的考量上,此機制還具有防止一些惡意的欺騙(包括雙重消費、竊取與否認),如此一來可以預防消費者與商家之間發生爭議時產生的責任歸屬問題。
Although the wireless network is developed day by day at present, the wireless payment mechanism is still at embryonic stage. In this thesis, we present a secure and efficient micropayment system which uses hash chain and unbalanced one-way binary tree techniques. The proposed system is vendor-nonspecific because the customer doesn’t need to designate one or more vendors which he wants to deal with when withdrawing money from the bank. Our system not only offers strong degree of security but also provides anonymity to protect customer’s privacy. The proposed withdrawal and deposit protocols are off-line; thus the customer needs only a one-round procedure to pay for a transaction, which is suitable to be used in wireless environment. Furthermore, our system can prevent the customers and the vendors from malevolent cheating attacks (e.g. double spending, stealing and denying). Therefore, our system can resolve the problem of responsibility between the customer and the vendor when a dispute occurs.
中文摘要 .....................................................i
ABSTRACT ............................................ii
致謝 ...................................................iii
第一章 緒論 .............................................1
1.1 研究動機 .............................................1
1.2 研究目的與貢獻 .....................................3
1.3 論文架構 .............................................6
第二章 相關研究 .............................................7
2.1 目前付款機制之發展 .....................................7
2.2 目前有線電子微付款系統之發展 .............................9
2.3 目前無線電子微付款系統之發展 ............................10
2.4 微付款系統架構與介紹 ....................................12
2.5 無線微付款系統需求 ....................................19
第三章 設計原則與系統設計 ....................................23
第四章 具匿名性及無須指定商家之微付款系統 ....................28
4.1 系統設定 ............................................29
4.2 具匿名性及無須指定商家之微付款系統 ....................31
4.2.1 登錄階段(用於離線) ............................31
4.2.2 付款階段(用於線上) ............................32
4.2.3 存款階段(用於離線) ............................33
4.3 進階之具匿名性及無須指定商家之微付款系統 ....................34
4.3.1 登錄階段(用於離線) ............................35
4.3.2 付款階段(用於線上) ............................35
4.3.3 存款階段(用於離線) ............................37
4.4 具無須指定商家之PayFair ............................38
4.4.1 登錄階段 ............................................39
4.4.2 付款階段 ............................................40
4.4.3 存款階段 ............................................41
第五章 安全與效率分析 ....................................43
5.1 安全分析 ............................................43
5.1.1 雙重消費偵測(Double Spending Detection) ............43
5.1.2 偽造預防(Forgery Prevention) ....................44
5.1.3 超過消費預防(Overspending Prevention) ............44
5.1.4 匿名性 ............................................44
5.1.5 進階方法之安全性分析 ............................45
5.1.6 具無須指定商家之PayFair的安全性分析 ....................47
5.2 效率分析與比較 ....................................48
5.2.1 效率分析 ............................................48
5.2.2 與各協定之比較 ....................................49
5.2.3 具無須指定商家之PayFair與Yen之PayFair之效率比較 ....53
第六章 實作結果與討論 ....................................56
6.1 消費者端程式模擬(使用簽章方式) ....................57
6.2 商家端程式模擬(使用簽章方式) ............................61
6.3 消費者端程式模擬(非使用簽章方式) ....................63
6.4 商家端程式模擬(非使用簽章方式) ....................64
6.5 效率之比較 ............................................66
第七章 總結與未來研究方向 ....................................69
參考文獻 ....................................................71
[1]H. Aksashika, H. Moribatake, and J. Gohhara, “Fast Micro-payment Scheme,” Symp. on Cryptography and information Security, Jan. 1996.

[2]R. Anderson, C. Manifavas, and C. Sitherland, Netcard-A Practical Electronic Cash System, Computer Laboratory, Cambridge, 1995.

[3]L. Buttyan, “Removing the financial incentive to cheat in micropayment schemes,” Electronics Letters, Vol. 36, No. 2, Jan. 2000, pp. 132-133.

[4]D. Chaum, “Blind signature for untraceable payments,” Advances in Cryptology, Crypto’82, Aug. 1982, pp.199-203.

[5]Y.H. Chen, Y.H. Liu, Y.Y. Chen and C.H. Song, “Online checking micro-payment system in the mobile environment,” The Proceeding of the Second International Workshop for Asian Public Key Infrastructures, 2002, pp. 142-146.

[6]W. Ham, H. Choi, Y. Xie, M. Lee, and K. Kim, “Secure One-way Mobile. Payment System Keeping Low Computation in Mobile Devices,” The Proceeding of WISA, 2002, pp. 287-301.

[7]R. Hauser, M. Steiner, and M. Waidner, Micro-Payments based on iKP, IBM Zurich, 1996.

[8]Z.-Y. Hu, Y.-W. Liu, X. Hu and J.-H. Li, “Anonymous micropayments authentication (AMA) in mobile data network,” INFOCOM 2004, Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, Vol.1, Mar. 2004, pp.46–53.

[9]Z. Huang and K. F. Chen, “Electronic payment in mobile environment,” The Proceeding of 13th International Workshop on Database and Expert Systems Applications, 2002, pp. 345-349.

[10]M.A. Kim, H.K. Lee, S.W. Kim, W.H. Lee, and E.K. Kang, “Implementation of Anonymity-Based e-Payment System for M-Commerce,” IEEE 2002 International Conference on Communication, Circuits and Systems and West Sino Expositions, 2002.

[11]S.Y. Kim, and W.J. Lee, “A PayWord-Based Micropayment Protocol Supporting Multiple Payments,” The 12th International Conference on Computer Communications and Networks, Oct. 2003, pp.609-612.

[12]S. Kim and H. Oh, “An Atomic Micropayment System for a Mobile Computing Environment,” IEICE Trans. Inf.&Syst., Vol.E84-D, Jun. 2001.

[13]K. Martin, B. Preneel, C. Mitchell, H. Hitz, G. Horn, A. Poliakova, and P. Howard, “Secure billing for mobile information services in UMTS,” The Proceeding of IS&N’98, 1998.

[14]S. Matsuo, and W. Ogata, “Electronic Ticket Scheme for ITS,” IEICE Trans. Fundamentals, Vol.E86-A, Jan. 2003.

[15]D. O’Mahony, M. Peirce and H. Tewari, Electronic payment systems for e-commerce, 2nd edition, Artech House, 2001.

[16]NIST, Secure Hash Standard, FIPS 180-1, 1995.

[17]T.P. Pedersen, “Electronic payments of small amounts,” Technical report, Aarhus University, Computer Science Department, Aug. 1995.

[18]R. Rivest, The MD5 message-digest algorithm, RFC 1321, Apr. 1992.

[19]R. Rivest, A. Shamir, Payword and Micromint, MIT Laboratory for Computer Science, May 1996.

[20]M. Sandirigama, A. Shimizu, and M.T. Noda, “Simple and Secure Coin(SAS-Coin)-A Practical Micropayment System” IEICE Trans. Fundamentals, Vol.E83-A, Dec. 2000.

[21]J.A. Senn, “The emergence of m-commerce,” Computer, Vol. 33, Dec. 2000, pp. 148-150.

[22]J.D. Tygar, “Atomicity in electronic commerce,” The Proceeding of 15th ACM Symp. On Principles of Distributed Computing, May 1996, pp.8-26.

[23]C.-T. Wang, C.-C. Chang, and C.-H. Lin, “A New Micro-Payment System using General Payword Chain,” Electronic Commerce Research, No.2, 2002, pp. 159-168.

[24]S. Xu, M. Yung, G. Zhang, and H. Zhu, “Money conservation via atomicity in fair offline e-cash,” The Proceeding of 2nd Int. Workshop on Information Security, LNCS 1729, 1996, pp.14-31.

[25]S.-M. Yen, L.-T. Ho, and C.-Y. Huang, “Internet Micropayment Based on Unbalanced One-way Binary Tree,” The Proceeding of International Workshop on Cryptographic Techniques and E-Commerce, CrypTEC '99, Hong Kong, 5-8 July 1999, pp.155-162.

[26]S.-M. Yen, “PayFair: a prepaid internet ensuring customer fairness micropayment scheme,” The Proceeding of IEE on Computers and Digital Techniques, Vol. 148, pp.207-213, Nov. 2001.

[27]A. Weimerskirch, C. Paar, and S. Chang Shantz “Elliptic Curve Cryptography on a Palm OS Device,” The 6th Australasian Conference on Information Security and Privacy-ACISP 2001, LNCS 2119, 2001, pp.502-513.

[28]Z. Yang, W. Lang and Y. Tan, “A new fair micropayment system based on hash chain,” The Proceeding of the 2004 IEEE Conference on e-Technology, e-Commerce and e-Service (EEE '04), 2004 , pp. 139-145.

[29]B. Cox, J.D. Tygar, and M. Sirbu, “NetBill Security and Transaction Protocol,” http://www.ini.cmu.edu/NETBILL/pubs/Usenix.html, 1995.

[30]EZPay, NEWEB.com, available at http://www.ezpay.com.tw.

[31]M. Manasse, “The Millicent Protocol for Inexpensive Electronic Commerce,” http://www.w3.org/Conferences/WWW4/Papers/246/, 1995.

[32]PayPal. X.com, available at http://www.paypal.com.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top