Font Size: a A A

Study On Electronic Commerce Transaction Protocols Based On E-Cash

Posted on:2004-10-18Degree:DoctorType:Dissertation
Country:ChinaCandidate:Q WangFull Text:PDF
GTID:1118360122496927Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
With the development of network technologies, global integration and network connections have become an irresistible trend. Electronic commerce is regarded as an important symbol for Internet and information technologies, which is a landmark of historical progressed. Moreover, e-Cash is vital payment means in electronic commerce. E-Cash is popular for security, reliability and anonymity. From the point of view of protection participants' interests in a transaction, this dissertation is devoted to the conflicts between anonymity and atomicity of e-Cash transaction protocols. Some models, algorithms and verification method for e-Cash transaction protocols are included in the paper. The mail works of the paper can be summarized as follows:1. According to the characteristics of e-Cash, the properties of protection participants' interests required for e-Cash transaction protocol is summarized. Meanwhile, the architecture of securing for e-Cash protocols is analysized. The lay of the e-Cash protocol is defined in the architecture.2.The research of secure techniques in the bottom of the architecture includes two parts: (1) Implementation of access control system based on IPChains of Linux .A new method is introduced to implement user access control based on IPChains. The combination of "Challenge-Response" authentication and dynamic adding access rules according to user is adopted to implement user access control. The method can effectively solve the existing defects of user access control in traditional Packet Filtering Firewall and features transparency and consistency. It is high efficiency access control system of firewall. (2) The research and design of AAA management based on VPN. According to the characteristics of VPN, an AAA management system architecture based on VPN is presented using the thinking of scattered management and strategic configuration of tunnel connection, then a set of communication protocol are designed to realize authentication, authorization, accounting. The flexibility of the system is improved and convenient and high efficiency user management is provided.The basis for the study on e-Cash transaction protocol is established by researching on the secure techniques to focus on the core problem.3.The model of anonymous atomic e-Cash transactions protocol based on ref[87]. Atomicity and anonymity are desirable properties, which are necessary for reliable and security electronic commerce transaction and the guarantee of participants'interests. However, there is trade-off between them. At present, the issues in e-Cash schemes are not deeply discussed; it is not straightforward to identify the essence of these properties. The model of anonymous atomic e-Cash transaction protocol with off-line TTP under unreliable communication using linear time temporal logic is presented to resolve the problem. The model not only overcomes the weakness of anonymous atomic transaction protocol with on-line TTP, but also meets high efficient and practicability. Furthermore, the atomicity of the model is established.4. CEMBS improved and ICSP protocol presented. CEMBS is improved and extended using e-Root publicly verifiable secret sharing. The ELGamal PKC is incorporated into CEMBS. ICSP protocol is presented based on RSA-based undeniable signatures. The security and validity in ICSP is established. Meanwhile,an atomic and anonymous e-Cash transaction protocol with off-line TTP based on the extended CEMBS and ICSP is presented. The novel protocol is instance of e-Cash model. The properties of the new e-Cash protocol are analyzed, such as atomicity, anonymity, terminate, non-repudiation, security and efficiency. Furthermore, the novel protocol contrast with the classic protocols in efficiency, atomicity and data storage to show its advantages.5.A new formal verification method based on SVO. The two instances are given to illustrate the limitations of SVO on analysis electronic commerce protocol. The new formal verification method is proposed in this paper, which expands the analysis framework of SVO and...
Keywords/Search Tags:e-Cash, Atomicity, Anonymity, Non-repudiation, Transaction protocol, Formal Verification
PDF Full Text Request
Related items