Font Size: a A A

Study On Anonymous Electronic Payment Protocol And Security Technology

Posted on:2005-03-04Degree:DoctorType:Dissertation
Country:ChinaCandidate:Q WangFull Text:PDF
GTID:1118360125963597Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The e-business appeared after information technology was used as a tool for business activity. The Internet-based e-business has to provide the electronic payment service for millions of customers and merchants. Thus popularization and application of e-business depend directly on the successful implementation of electronic payment. The most important factor of online electronic payment is to assure the security of system. Existing payment protocols are difficulty to satisfy the needs of e-payment on Internet because Internet has the characteristics such as opened, distributed and insecurity. The main problems are followings: a) The security of system is incomplete. b) The mechanism of authentication is complex. c) It is difficult to protect privacy of customer. d) It is poor to support the evidence of transaction. e) It cannot support multi-bank. f) It is poor to support multi-client.Aiming at above shortages and application requirements in electronic payment, this dissertation proposes a new anonymous electronic payment protocol on Internet. The protocol is based on the ideal of access authorization and right transfer in a distributed environment, and adopts the access control of delegation certificate instead of identity certificate of customers. It is a key-oriented access control. The access authorization to bank account of customer is implemented by the delegation certificate. And the access right can be transferred by a chain of delegation certificates. Thus, the flexibly transaction authorization can be supported. In the payment process, the user's access right directly binds with authorization certificate (or certificate chain), which is unnecessary to provide bank account and identity certification. So user's bank accounts are well protected; user's anonymity is gained; efficiency of transaction is also improved.The dissertation proposes a new protocol transaction model. Excepting for customer, merchant and bank, the model introduces an intermediator to process the payment and introduces an authentication organization to authenticate bank, merchant and intermediator. We put forward a mixed protocol trust model, which combines hierarchy structure and distributed trust structure. There is a hierarchy trust structure among authentication organization, bank, merchant and intermediator, but there is a distributed trust structure among customers. In the dissertation, transaction flow of the protocol is designed which not only protects user's privacy, but also merges all records of bank, merchant and intermediator so as to track entire transaction process. Based on above proposed anonymous electronic payment protocol and transaction model, the thesis studies farther their relative technologies as following: a) Public-key Algorithm. After analyzing traditional RSA and backpack algorithm, a modified RSA is proposed to weaken the characteristic that traditional RSA is easily attacked by factorization. The algorithm can shorten the length of encryption key so as to increase the encryption speed.b) Distributed Access Control. The entire distributed environment of Internet is especially suited to make use of the access control of delegation certificate. And the delegation certificates to tranfer access right form the delegation network. An abstract model of delegation network and its formalism description is discussed in detail. c) Protection of Privacy. The anonymous electronic payment protocol runs on the digital certificate, in which each of participators has to have identity certificate or authorization certificate. After analyzing the threatens for privacy are brought by certificate-based authentication and access control, the paper shows some important technologies such as the key-oriented authorization certificate, the certificate reduction, temporary and task-specifi key so as to reduce threatens for privacy in using digital certificate.d) Design and Implement of E-payment Software Package. We develop a set of security electronic payment software based on our research, which includes the...
Keywords/Search Tags:electronic payment, security payment, digital certificate, access authorization, anonymity
PDF Full Text Request
Related items