430 likes | 591 Views
VarietyCash: A Multi-purpose Electronic Payment System. By M. Bellare, J. Garay, C. Jutla, M. Yung --- 1998. By Liang Li Chris March 29th. Introduction. What is Electronic Payment System? Essential Component of Electronic Commerce Widely Used in the World Then … Secure???.
E N D
VarietyCash: A Multi-purpose Electronic Payment System By M. Bellare, J. Garay, C. Jutla, M. Yung --- 1998 By Liang Li Chris March 29th
Introduction • What is Electronic Payment System? • Essential Component of Electronic Commerce • Widely Used in the World • Then … Secure???
Issues Concerned • Anonymity • Payment Untraceable to a third party • Account-based or Account-less • Account-based is more expensive in order to maintain the accounts • Network versus card-based • Transactions across the network • Atomicity • Fair and Robust in the sense of network failure
System Proposed • Trust-Based Anonymity • Account-less • Network-Based & Card-Based • Atomicity
System Proposed - More • What is new here? • Coins and Tokens authenticated under an issuer master key • Spent coins can be erased (Improve the scalability) • Combine symmetric-key cryptography for performance with public-key systems
Security & Design Goals • Protocol Security • Safety guarantees, no adversaries can compromise or spoil the system • Internal Security • Withstand insider attacks, no cheaters • Network Security • Prevent attacks through “break-ins”. Need careful design of interface to the external network • User Security • Protect its own database (E-coin)
Parties & Roles • Participant • A generic name for a party involved in the system • Issuer • Party who issues the coins • Coin Holder * • A party who holds the money • Payee • A party who is willing to accept coins as payment • Bank • A number of banks will be involved in moving funds due to conversions between electronic and real money • Certification Authority • The Party who can certify the public keys of the participants
Coin-Holder • Coin Purchaser • Purchase coins from the issuer • Redeemer • Turn coins into real money • Payer • The party who pays for the good/service • Refresher • Get new coins for old • Changer • Make changes
Others • Register • Register a public key at the issuer • Enroller • Enroll for a particular role such as coin purchaser or merchant
E-coin • The most basic component in the whole system • An object consisting of a unique identifier (coin ID), amount, expiry date and an authenticating cryptographic tag
E-coin • Unique Identifier • Value (Amount) • Expiry Date • Authenticating Cryptographic Tag Fig 1. Structure of an un-encrypted coin
E-coin - More • Unique Identifier • Value (Amount) • Expiry Date • Authenticating Cryptographic Tag • Search Tag • Coin Status Fig 2. Encrypted coin in the Issuer’s database
Protection from Forgery Coin • Tag is computed in protected, tamper-proof hardware • Tag computing algorithm is strong • Coin Database is protected
Coin Purchase Request • Take form of a list of denominations • For example, (2, $2.50), (1, $1.25), (3, $2) means 2 coins of value $2.50, 1 coin of value $1.25, 3 coins of value $2. The total sum is 12.25
Operations Involved • Registration – Register ID and Get own PK • Enrollment – A Participant enrolls for a role • Coin Purchase * - Buy E-coin from Issuer • Payment * - Deal Transaction • Change – Make Changes from Issuer • Redeem – Get Real Money • Refresh – Keep freshness of E-coins • Refund – Ask for E-coins if network failure
Coin Purchase ProtocolMore Detail • Design Requirement • Valid Transaction go through • Cannot get coins free • No false debit
Coin Purchase ProtocolMore Detail • Overview • Terminology
Coin Purchase Protocol • How Does ACH Work? • 1.A company/individual (Receiver) authorizes a company/individual (Originator) to initiate a transaction to their financial institution account. • 2.The Originator prepares information about the transactions that are to be automated for its customers or employees and passes it along to an Originating Depository Financial Institution (ODFI). • 3.The ODFI collects ACH transactions from participating companies, consolidates the information and presents it to the ACH Operator. (The ODFI may retain entries for its own account holders) • 4.ACH Operator processes transaction files from submitting ODFIs and distributes it to Receiving Depository Financial Institutions (RDFls). • 5.The RDFI receives entries for its customer accounts and posts entries on the settlement date. Transactions are also reported on account statements
Coin Purchase ProtocolMore Detail • Coin Request
Coin Purchase ProtocolMore Detail • Execution • Issuance
Coin Purchase Protocol • Message Integrity • Plaintext Awareness Encryption Scheme • Correct Decryption convinces the decryptor that the transmitter knows the plaintext encrypted • Prevent from tampering with a ciphertext but no authentication guaranteed
Payment Protocol - More Detail • Design Requirement • Valid Payment go through • Accepted payments are valid • Payment is paid to the correct party • No double spending
Payment Protocol - More Detail • Overview
Payment Protocol - More Detail • Terminology
Payment Protocol - More Detail • Invoice • Send Coins
Payment Protocol - More Detail • Validation Request • Issuance
Payment Protocol - More Detail • Receipt
More Applications Used • Integrate with Card Cash • Card-Based System • Pseudo-anonymous • Offline • Non-circulating
Integrate with Card Based System • Load Protocol • On-line Account-based load • Terminology
Integrate with Card Based System • Protocol Flows
Blind Signature • A signature scheme that the signer signs it with no idea of what the content is • Properties • Cannot prove that he signed it in that particular protocol • The signature is valid • Use cut-and-choose technical
Blind Signature • General Process • Takes a document and multiplies it by a random value which is called a blinding factor. • Send the blinded document • Sign the blinded document • Divide out the blinding factor, leaving the original document signed
Implementation • Scenario • There is a group of counterintelligence agents. They want to the counterintelligence agency sign a document for them for diplomatic immunity. Even the counterintelligence agency have no idea of who they are. The document should insert agent’s cover name that each agent has a list of them. • ?What will he do then?
Protocol • Assumption • The signature function and multiplication are commutative • Parties • ALICE – Agency’s Large Intelligent Computing Engine • BOB – Bogota Operations Branch
Protocol - More • BOB prepares n documents each using a different cover name giving himself diplomatic immunity • BOB blinds each of these documents with a different blinding factor • BOB sends n documents to ALICE • ALICE chooses n-1 documents at random and ask ZBOB for the blinding factor for each of them
Protocol - More • BOB sends ALICE the appropriate blinding factor • ALICE opens n-1 documents, makes sure they are correct --- and not pension authorizations • ALICE signs the remaining document and sends it to BOB • The agent removes the blinding factor and reads the new cover name in the document. It is “James Bond”
Attack on Blind Signature • Probability Guess • Choose n/2 documents rather than n-1 one • Tricky Twin Document • Choose 2 different blinder factor so that transform 2 different document into the same blinded document.
?Questions? Thank you
Acknowledgement • Prof. C. Lynch • http://www.achnetwork.com/introtoach.html • Applied Cryptography – Bruce Shneier • Blind Signature for Untraceable Payments • --- 2005 Mar 29th
Text Text Text Text Text Text Text Text