Font Size: a A A

The Study And Design On Secure Micro-Payment System

Posted on:2006-02-09Degree:MasterType:Thesis
Country:ChinaCandidate:B LianFull Text:PDF
GTID:2168360155955199Subject:Cryptography
Abstract/Summary:PDF Full Text Request
In spite of its advantages of lowering the cost, expanding the market, unrestrained by the geographical areas and space etc, electronic commerce is confronted with many security issues that hinder its widespread applications. It must adopt the security technologies (e.g. encryption, electronic signature, electronic envelope, electronic certification, and firewall) to provide the participants with the authentication service, access control service, confidentiality service, undeniable service, and other reliable security service. Its security architecture includes support service level, transport level, switching level, and business level. At present, the security scheme mainly involves the security communication protocol; commercial servers supporting secure transactions and electronic payment system, but many problems remain to be resolved. Micro-payment schemes provide lower cost of protocol computation and communication overhead than conventional ones. These systems are suitable for a considerable of low value information-payment services on telecommunications, mobile communications and computer networks.With the rapid growth of network applications, network security has become a more and more important issue. A very important factor of network security is cryptographic protocols. Much of development has been achieved in the area of cryptography for the last thirty years, but it is not enough. As we know, the core of network security is cryptography including traditional block ciphers and public key ciphers. But many problems of networks security always lie in protocols not in the cipher arithmetic. It is well known that designing correct and secure cryptographic protocols is an error-prone task. In 1989, Burrow, Abadi and Needham developed BAN logic, which quickly become the most widely used and discussed formal method for the analysis of protocols. The appearance of BAN logic has led several authors to propose alternatives to BAN including GNY, AT, VO and SVO etc, which we call BAN-like logics. But as belief logic, the...
Keywords/Search Tags:micro-payment, anti-overdraft, high-efficiency, BAN logic, Kailar logic
PDF Full Text Request
Related items