Font Size: a A A

Research Of Electronic Commerce Security Technology

Posted on:2012-05-10Degree:MasterType:Thesis
Country:ChinaCandidate:N C WangFull Text:PDF
GTID:2249330395463991Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the development of modern network communication technology, e-commerce, which is a new payment technique, has been used by people in daily life as a highly efficient trading platform. However, security risks appear during the rapid development of e-commerce, especially those with regard to online transactions and payment. Secure payment protocols play important role in e-commerce. Among various security technologies, this dissertation focuses on proxy signature and micro-payment protocol.Proxy signature is a special kind of digital signature, which is important to the development of e-commerce. Generally speaking, digital signature can ensure data integrity and non-repudiation and establish trust among users. When it is inconvenient for an original signer to perform e-commerce activities, the original signer can delegate his signing right to a proxy such that the proxy can perform actions on behalf the original signer. For example, an agent can sign contracts on a remote server on behalf of a delegator. In modern times, an increasing number of e-commerce activities are using proxy signature. Micro-payment is a novel payment technique which is suitable for petty cash transactions. It is a new direction in e-commerce.and can satisfy requirement of electronic payment. Micro-payment protocols have been widely used in fields such as online information query, software downloads with micro-payment. The details of this dissertation can be described as follows:(1) New proxy signature based on discrete logarithm problem:Some proxy signature schemes need a fully trusted third party to guarantee security. But in some application, it is hard to set up a trusted party. In addition, corruption of a trusted third-party may cause security problems. Therefore, it is attractive to construct a proxy signature without a fully trusted party. At first, this dissertation briefly describes some well-known proxy signature schemes. Then a proxy signature scheme based on the DLP is presented based on the related previous works. In this scheme, the delegation authorization information issued by the original signer is blinded such that it can be transmitted over the public channel. Hence this scheme guarantees confidentiality of information during the delegation stage.(2) Micro-payment:At present, research works of micro-paymentin protocols are very active. A lot of new micro-payment solutions are presented based on the traditional micro-payment protocols (e.g., those based on hash chain). However, as Internet can be accessed publicly, some presented micro-payment protocols cannot meet specific security requirments of consumers. For example, a vendor may investigate records to analyze commercial information with regard to consumers. Thus the user’s personal privacy may be exposed. On the other hand, some micro-payment protocols can not provide multi-denomination of payment and may be troublesome during transaction. Therefore, it is necessary to design an anonumous micro-payment protocol with multi-denomination payment. Based on previous works, a new micro-payments scheme based on UOBT matrix is presented. This scheme preserves anonymity and traceability. In addition, it has the flexibility to provide multi-denomination payment.
Keywords/Search Tags:E-commerce, Electronic payment, Proxy signature, Micro-payment, Hash chain
PDF Full Text Request
Related items